Presentations
From Mild To Wild: How Hot Can Your SLSA Be?
Policy engines can consume attestations at three heat levels - from verifying builder identity (mild), to automated enforcement with admission controllers (medium), to building trust chains through provenance (wild).
1-2-Step: How do you SLSA?
Demonstrate an end-to-end Tekton-based software factory implementing SLSA 1.2's Source and Build tracks with automated policy enforcement to ensure high-assurance security without slowing developers.
Who Are You Building For: Pipelines Have a Purpose
The trust model in Konflux empowers developers to customize build pipelines for their specific needs while contributing improvements back to the community through verified, reusable Tekton tasks.
Not Just Ticking a Box ☑️: Establishing Trust in Artifacts with Provenance 🔐🔗
Moving beyond checkbox compliance to establish genuine trust in software artifacts through SLSA provenance, in-toto attestations, and verifiable supply chain security with Konflux.
Who Are You Building For: Pipelines Have a Purpose
Konflux enables developers to quickly onboard to secure build pipelines with zero-to-working setup in minutes, complete developer journey from onboarding through hermetic builds and policy-driven development.