Cloud-Native Software Development
Sovereignty Through Architecture Cloud-native software development is more than just a set of …

Imagine buying a ready-made meal at the supermarket without an ingredient list. For years, this was the standard in software development: we download container images from the internet and trust that what’s inside matches the label. However, incidents like Log4j have shown that a single compromised library in the supply chain can cripple global infrastructures.
In 2026, Supply Chain Security is no longer a “nice-to-have.” With regulations like the EU Cyber Resilience Act (CRA), transparency over the software supply chain becomes a mandatory task for medium-sized businesses.
A Software Bill of Materials (SBOM) is a machine-readable list of all components, libraries, and dependencies of a software.
An SBOM alone is not enough if an attacker can swap the image unnoticed on its way to the cluster. We must ensure that only the code we have verified ourselves is executed. This is where Sigstore comes into play.
With the tool Cosign, we digitally sign container images.
True supply chain security does not end at deployment. It is a continuous cycle:
Securing Kubernetes today means securing the entire pipeline. Those who invest in SBOMs and signature workflows today not only protect themselves from attacks but also meet the compliance requirements of tomorrow. Security thus becomes a quality feature of your software.
What is the best format for an SBOM? There are two industry standards: CycloneDX and SPDX. CycloneDX is often easier to handle for modern Cloud-Native tools, while SPDX covers more in-depth legal licensing information. Most tools today support both formats.
Do we need our own Public Key Infrastructure (PKI) for Sigstore? Not necessarily. Sigstore offers “Keyless Signing,” a method where identities are verified via OIDC (e.g., GitHub or Google login). For medium-sized businesses, this is often the least maintenance-intensive solution.
Does scanning and signing slow down the CI/CD pipeline? An SBOM scan usually takes only a few seconds. The signing is almost instantaneous. The time investment is minimal compared to the security gain and the time saved in the event of an audit or incident.
Is your software supply chain fully documented? Transparency is the best protection against modern cyber-attacks. At ayedo, we support you in integrating automated security checks and signature workflows into your pipelines. Make your software supply chain secure for the future.
Sovereignty Through Architecture Cloud-native software development is more than just a set of …
In the traditional IT world, maintenance windows are often a necessary evil. Operating system …
In modern software development, the unsecured handling of credentials—so-called “Hardcoded …