Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

streamling menu, added use case, made blog top level #111

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 0 additions & 3 deletions docs/_data/menus/about-us.yml
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,6 @@
- text: Team
path: team

- text: Blog
path: blog

- text: Jobs
path: jobs

Expand Down
8 changes: 0 additions & 8 deletions docs/_data/menus/documentation.yml
Original file line number Diff line number Diff line change
Expand Up @@ -32,13 +32,5 @@

- separator: true

- text: PowerShell cmdlets
path: powershell

- text: Crypto Providers
path: crypto-providers

- separator: true

- text: Product updates
path: changelog
10 changes: 7 additions & 3 deletions docs/_data/menus/menus.yml
Original file line number Diff line number Diff line change
@@ -1,14 +1,18 @@
- text: Product
path: product
subdir: true

- text: Code Signing
path: code-signing
- text: Use Cases
path: use-cases
subdir: true

- text: Documentation
path: documentation
subdir: true

- text: Blog
path: blog
subdir: false

- text: About us
path: about-us
Expand Down
22 changes: 0 additions & 22 deletions docs/_data/menus/product.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,25 +3,3 @@

- text: Editions
path: editions

- separator: true

- text: For DevOps teams
path: devops

- text: For InfoSec teams
path: infosec

- text: For Open Source projects
path: open-source

- separator: true

- text: Office macro signing
path: office-macros

- text: Thales DPoD Cloud HSM
path: thales-dpod

- text: PKI Consortium best practices
path: pkic-best-practices
8 changes: 8 additions & 0 deletions docs/_data/menus/use-cases.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
- text: DevOps
path: devops

- text: InfoSec
path: infosec

- text: Open Source
path: open-source
132 changes: 132 additions & 0 deletions docs/use-cases/dev-sec-ops.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,132 @@
---
title: SignPath for DevOps
description: Using SignPath in a DevOps pipeline
---

{% include header.html %}

<section class="bg-image font-white top-section" style='background-image:url(/assets/img/devops.jpg);'>
<div>
<h1>{{ page.title }}</h1>
</div>
</section>

<section class="bg-grey devops-section">
<div>
<div class='columns'>
{% include devops.svg %}
<div>
<h2>Code Signing in the pipeline</h2>
<p>
With SignPath.io, code signing can be integrated into your existing continous deployment pipeline with just a few steps. You don't need to worry about connecting usb tokens to build servers, handling passwords prompts or securing your private keys. Signing just becomes one more step in your process, even for nested artifacts. Thanks to a clear separation of concerns, DevOps engineers can focus on the build and deployment process and leave the security concerns to their InfoSec colleagues.</p>
</div>
</div>
<p class='center'><a class='btn btn-primary trial' href='{{ site.data.hosts.app[site.target_environment] }}/Web/Subscription/StartFreeTrial'>Start free trial</a></p>
</div>
</section>

<section class='devops-section'>
<div>
<h2>Build process integration</h2>
<p>
SignPath.io is built with DevOps in mind. Adding a code signing step to your build process requires just a few lines of code by including our PowerShell script, calling the API directly or using one of our build system integrations. The artifact is then extracted, and all specified files are signed recursively. SignPath can be integrated in a synchronous and an asynchronous call, providing flexibility for different use cases. In the synchronous case, the build job waits for the uploaded artifact to be signed and continues with the following steps right away. In the asynchronous case, the signing request has to be approved and a second pipeline is then started for e.g. deploying the signed artifact. Deeper integration including origin verification is supported with AppVeyor, all other CI systems such as Jenkins, Travis, TeamCity or CircleCI can be integrated by using a generic REST call via PowerShell or cURL.
</p>
<p><a class='btn btn-primary' href='/documentation/build-system-integration'>View documentation</a></p>
<div class='tabs'>
<ul class='header'>
<li class='active'><a data-tabkey='powershell' href="#"><i class="icon-powershell"></i> <span>PowerShell</span></a></li>
<li><a data-tabkey='curl' href="#"><i class="icon-curl"></i> <span>cURL</span></a></li>
<li><a data-tabkey='jenkins' href="#"><i class="icon-jenkins"></i> <span>Jenkins</span></a></li>
<li><a data-tabkey='github-actions' href="#">{% include github.svg %} <span>GitHub Actions</span></a></li>
<li><a data-tabkey='appveyor' href="#"><i class="icon-appveyor"></i> <span>AppVeyor</span></a></li>
<li><a data-tabkey='azuredevops' href="#"><i class="icon-azure-devops"></i> <span>Azure DevOps</span></a></li>
</ul>
{% raw %}
<div class='panel'>
<code data-tabcontent='powershell' class='active'>
<span><span class='command'>Submit-SigningRequest</span> `</span>
<span> <span class='parameter'>-OrganizationId</span> <span class='variable'>$SIGNPATH_ORGANIZATION_ID</span> `</span>
<span> <span class='parameter'>-ApiToken</span> <span class='variable'>$SIGNPATH_API_TOKEN</span> `</span>
<span> <span class='parameter'>-ProjectSlug</span> my_software `</span>
<span> <span class='parameter'>-SigningPolicySlug</span> release-signing `</span>
<span> <span class='parameter'>-InputArtifactPath</span> build/my-release.msi `</span>
<span> <span class='parameter'>-OutputArtifactPath</span> build-signed/my-release.msi `</span>
<span> <span class='parameter'>-WaitForCompletion</span></span>
</code>
<code data-tabcontent='curl'>
<span><span class="variable">result</span>=$(<span class='command'>curl</span> <span class='string'>"https://app.signpath.io/api/v1/</span><span class='variable'>${SIGNPATH_ORGANIZATION_ID}</span><span class='string'>/SigningRequests"</span> \</span>
<span> <span class='parameter'>-H</span> <span class='string'>"Authorization: Bearer </span><span class='variable'>${SIGNPATH_API_TOKEN}</span><span class='string'>"</span> \</span>
<span> <span class='parameter'>-F</span> <span class='string'>"ProjectSlug=</span>my_software<span class='string'>"</span> \</span>
<span> <span class='parameter'>-F</span> <span class='string'>"SigningPolicySlug=</span>release-signing<span class='string'>"</span> \</span>
<span> <span class='parameter'>-F</span> <span class='string'>"Artifact=</span>@./build/my-release.msi<span class='string'>"</span> \</span>
<span> <span class='parameter'>--retry</span> 20 <span class='parameter'>--retry-delay</span> 30 <span class='parameter'>--silent --verbose</span>)</span>
<span><span class='variable'>url</span>=$( echo <span class='string'>"<span class='variable'>$result</span>"</span> | grep -i <span class='string'>'^&lt; Location: '</span> | grep -io <span class='string'>'https://.*'</span> | tr -d <span class='string'>'\r'</span> )</span>
<span><span class='command'>curl</span> <span class='string'>"<span class='variable'>$url</span>/SignedArtifact"</span> <span class='parameter'>--output</span> <span class='string'>"build-signed/my-release.msi"</span> <span class='parameter'>--silent </span> \</span>
<span> <span class='parameter'>-H</span> <span class='string'>"Authorization: Bearer </span><span class='variable'>${SIGNPATH_API_TOKEN}</span><span class='string'>"</span> </span>
</code>
<code data-tabcontent='jenkins'>
<span><span class='command'>submitSigningRequest</span>( </span>
<span> <span class='parameter'>organizationId:</span> <span class='string'>"</span><span class='variable'>${params.SIGNPATH_ORGANIZATION_ID}</span><span class='string'>"</span>, </span>
<span> <span class='parameter'>ciUserTokenCredentialId:</span> <span class='string'>"</span><span class='variable'>${params.SIGNPATH_CI_USER_CREDENTIAL_ID}</span><span class='string'>"</span>, </span>
<span> <span class='parameter'>projectSlug:</span> <span class='string'>"my_software"</span>, </span>
<span> <span class='parameter'>signingPolicySlug:</span> <span class='string'>"release-signing"</span>, </span>
<span> <span class='parameter'>inputArtifactPath:</span> <span class='string'>"build/my-release.msi"</span>, </span>
<span> <span class='parameter'>outputArtifactPath:</span> <span class='string'>"build-signed/my-release.msi"</span>, </span>
<span> <span class='parameter'>waitForCompletion:</span> true </span>
<span>) </span>
</code>
<code data-tabcontent='github-actions'>
<span>- uses: <span class='command'>signpath/[email protected]</span> </span>
<span> with:</span>
<span> <span class='parameter'>api-token</span>: <span class='string'>'</span><span class='variable'>${{ secrets.SIGNPATH_API_TOKEN }}</span><span class='string'>'</span></span>
<span> <span class='parameter'>organization-id</span>: <span class='string'>'</span><span class='variable'>${{ vars.SIGNPATH_ORGANIZATION_ID }}</span><span class='string'>'</span></span>
<span> <span class='parameter'>project-slug</span>: <span class='string'>'my_software'</span></span>
<span> <span class='parameter'>signing-policy-slug</span>: <span class='string'>'release-signing'</span></span>
<span> <span class='parameter'>github-artifact-id</span>: <span class='string'>'</span><span class='variable'>${{ steps.upload-unsigned-artifact.outputs.artifact-id }}</span><span class='string'>'</span></span>
<span> <span class='parameter'>output-artifact-directory</span>: <span class='string'>'./build-signed'</span></span>
<span> <span class='parameter'>wait-for-completion</span>: <span class='string'>'true'</span></span>
</code>
<code data-tabcontent='appveyor'>
<span><span class='command'>deploy:</span></span>
<span> - <span class='parameter'>provider</span>: Webhook</span>
<span> <span class='parameter'>url</span>: <span class='string'>https://app.signpath.io/API/v1/</span><span class='variable'>$(SIGNPATH_ORGANIZATION_ID)</span><span class='string'>/Integrations/AppVeyor?</span><span class='parameter'>ProjectSlug=</span>my_software<span class='string'>&</span><span class='parameter'>SigningPolicySlug=</span>release-siging</span>
<span> <span class='parameter'>authorization</span>:</span>
<span> <span class='parameter'>secure</span>: <span class='string'>VGhpcyBpcyBub3QgdGhlIHNlY3JldCB0b2tlbiB5b3UgYXJlIGxvb2tpbmcgZm9yLi4uIC0gU2lnblBhdGguaW8=</span></span>
</code>
<code data-tabcontent='azuredevops'>
<span>- task: <span class='command'>SignPathSubmitSigningRequest@2</span> </span>
<span> <span class='parameter'>inputs</span>:</span>
<span> <span class='parameter'>organizationId</span>: <span class='string'>'</span><span class='variable'>$(SIGNPATH_ORGANIZATION_ID)</span><span class='string'>'</span></span>
<span> <span class='parameter'>ciUserToken</span>: <span class='string'>'</span><span class='variable'>$(SIGNPATH_API_TOKEN)</span><span class='string'>'</span></span>
<span> <span class='parameter'>projectSlug</span>: <span class='string'>'my_software'</span></span>
<span> <span class='parameter'>signingPolicySlug</span>: <span class='string'>'release-siging'</span></span>
<span> <span class='parameter'>inputArtifactPath</span>: <span class='string'>'./build/my-release.msi'</span></span>
<span> <span class='parameter'>outputArtifactPath</span>: <span class='string'>'./build-signed/my-release.msi'</span></span>
<span> <span class='parameter'>waitForCompletion</span>: <span class='string'>'sync'</span></span>
</code>
</div>
{% endraw %}
</div>

</div>
</section>

<section class='font-white bg-blue'>
<div>
<div class='columns'>
<div>
<i class="icon icon-origin-verification header"></i>
<h2>Origin verification for enhanced security</h2>
<p>For selected CI systems, SignPath can provide even more transparency by verifying that each signed artifact stems from a specific code repository, branch and source code commit. By integrating the origin information in the signature, each signed artifact can be traced back to the source code that it was build from.</p>
</div>
<div>
{% include user_big.svg %}
<h2>Manual approval steps</h2>
<p>
Security critical tasks such as code signing often include manual approval steps in order to increase the security and avoid malicious code to be deployed into a production system. SignPath.io allows you to configure multiple security restrictions, including manual approvals. All details necessary to validate the artifact, such as its origin, SHA256 hash and contents are readily available in the web application.</p>
</div>
</div>
</div>
</section>

{% include footer.html %}
75 changes: 75 additions & 0 deletions docs/use-cases/info-sec.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,75 @@
---
title: SignPath for InfoSec
description: Using SignPath to secure your internal supply chain
---

{% include header.html %}

<section class="bg-image font-white top-section" style='background-image:url(/assets/img/infosec.jpg);'>
<div>
<h1>{{ page.title }}</h1>
</div>
</section>

<section class="bg-grey infosec-section">
<div>
<h2>SignPath makes Code Signing secure</h2>
<p>How secure are your private keys? Who has access to them and how is their usage regulated? Stolen or misused code signing certificates are a severe threat to ISPs and their customers. The only way to prevent breaches and reduce the risks of successful attacks is to protect your private keys and to estabalish a secure, transparent process.</p>
<p><a class='btn btn-primary' href='/product/casc'>CA Security Council best practices</a></p>
</div>
</section>

<section class='feature infosec-section'>
<div class='img'><div class='no-shadow'>{% include chain.svg %}</div></div>
<div class='description'>
<h2>Chain attacks</h2>
<h3>Don't be the weakest link</h3>
<p>
A stolen code signing certificate does not only put your organization at risk, but also all your customers. ISPs are increasingly becoming a target with the sole purpose of attacking one or several of their customers. IT organizations are reacting and demand their suppliers not only to sign their code, but to establish secure code signing processes.
</p>
<p class='center'><a class='btn btn-secondary' href='/code-signing/media-coverage'>Read about media coverage</a></p>
</div>
</section>

<section class='feature right infosec-section'>
<div class='img'><div class='no-shadow'>{% include devops.svg %}</div></div>
<div class='description'>
<h2>Agility and Security</h2>
<h3>Free your developers to move fast</h3>
<p>
Define clear policies on how code signing certificates may be used - give your development teams the freedom to implement them for their processes. SignPath provides a clear separation of duties, where security teams stay on top of private key access and policy enforcement and development teams can focus on delivering software.
</p>
<p><a class='btn btn-secondary' href='/product/devops'>See our DevOps integration</a></p>
</div>
</section>

<section class='feature infosec-section'>
<div class='img'><div class='no-shadow'>{% include incident-management.svg %}</div></div>
<div class='description'>
<h2>Incident management</h2>
<h3>Be prepared and take informed decisions</h3>
<p>
SignPath allows you to lock down the code signing process and define multiple gates to ensure only malware-free, approved software from trusted build systems is signed. Every usage of your private key is logged, making it possible to trace any misuse.
</p>
<p><a class='btn btn-secondary' href='/code-signing/theory#certificate-revocation'>Read about certificate revocation</a></p>
</div>
</section>

<section class='feature right'>
<div class='img'><div class='no-shadow'><img src='/assets/img/product/features/secure-private-keys.png' title='Secure private keys' /></div></div>
<div class='description'>
<h2>Secure storage of private keys</h2>
<h3 class='subtitle'>Rest assured that your private keys can never be compromised</h3>
<p>
SignPath provides a FIPS-certified Hardware Security Module (HSM) to generate and store the private keys for your certificates. The HSM is located in a physically secured data center. Every signing operation takes place on the HSM ensuring that the private key is never exposed. The key infrastructure of SignPath fulfills all requirements for Extended Validation (EV) certificates without having to deal with USB tokens or spending money on dedicated hardware.
</p>
<p>
For customers who prefer direct control over their key material, SignPath offers <a href='/product/thales-dpod'>dedicated Thales DPoD Cloud HSM instances</a>. Use this option for local key backups, importing and exporting options, and to guarantee key availability independently from your SignPath subscription. (Export and backup options require cloning domains or key wrapping.)
</p>
<p><a class='btn btn-secondary' href='/code-signing/private-keys'>Read about storage options for private keys</a></p>
</div>
</section>



{% include footer.html %}
Loading