@@ -24,11 +24,56 @@ Sourcemeta One is available in two editions:
2424 hosting solution that competes with Sourcemeta. After four years from each
2525 release, the code transitions to AGPL-3.0.
2626
27- - ** Enterprise** : Includes additional features not available in the Community
28- edition. Requires a [ commercial
27+ - ** Enterprise** : Includes additional features and supply chain security
28+ capabilities not available in the Community edition. Requires a [ commercial
2929 license] ( https://github.com/sourcemeta/one/blob/main/LICENSE-COMMERCIAL )
3030 from Sourcemeta.
3131
32+ ## Supply Chain Security
33+
34+ Starting with v4.2.2, the Enterprise container image ships with built-in
35+ supply chain security and regulatory compliance capabilities:
36+
37+ - ** Signed Container Images.** Every Enterprise image is cryptographically
38+ signed using [ Cosign] ( https://github.com/sigstore/cosign ) and the
39+ [ Sigstore] ( https://www.sigstore.dev/ ) transparency log, allowing you to
40+ verify image authenticity and integrity before deployment.
41+
42+ - ** Software Bill of Materials (SBOM).** Each release includes an SPDX SBOM
43+ attached as a signed attestation to the container image, providing full
44+ visibility into all vendored, npm, and system-level dependencies for
45+ vulnerability management and audit purposes.
46+
47+ - ** FIPS-Ready Cryptography.** The Enterprise image is built with the OpenSSL
48+ FIPS provider (` openssl-provider-fips ` ) for all cryptographic operations,
49+ supporting organizations that require FIPS 140 compliance.
50+
51+ ### Verifying Image Signatures
52+
53+ You can verify that an Enterprise container image was built and signed by
54+ Sourcemeta's official GitHub Actions pipeline using
55+ [ Cosign] ( https://github.com/sigstore/cosign ) . For example:
56+
57+ ``` sh
58+ cosign verify \
59+ --certificate-oidc-issuer " https://token.actions.githubusercontent.com" \
60+ --certificate-identity-regexp " ^https://github.com/sourcemeta/one/" \
61+ ghcr.io/sourcemeta/one-enterprise:v4.2.2
62+ ```
63+
64+ ### Retrieving the SBOM
65+
66+ The SPDX SBOM is attached as a signed in-toto attestation. You can verify and
67+ extract it using Cosign. For example:
68+
69+ ``` sh
70+ cosign verify-attestation --type spdx \
71+ --certificate-oidc-issuer " https://token.actions.githubusercontent.com" \
72+ --certificate-identity-regexp " ^https://github.com/sourcemeta/one/" \
73+ ghcr.io/sourcemeta/one-enterprise:v4.2.2 \
74+ | jq -r ' .payload' | base64 -d | jq ' .predicate'
75+ ```
76+
3277## Our Commitment to Excellence
3378
3479Sourcemeta is led by a member of the JSON Schema Technical Steering Committee,
0 commit comments