Organization, project, and project version
These are the organizational entities used to scope tenants and user access. All users belong to one or more organizations and might have different role levels. Inside organizations, projects, and versions represent a unique software product lifecycle. It's not mandatory, but the rest of the entities (workflows, attestations …, etc.) could be related to a particular project version. This is a sort of Release Management capability.
Data Gathering Primitives
Material
See Material Types.
In Chainloop, a material is any piece of evidence generated as part of the software development lifecycle (SDLC), or in more general terms, in any activity from the company compliance process. Examples of materials are:
A container image built in a CI pipeline, referenced by its OCI URL (oci://my-registry/my-repo@mytag)
A test or code coverage report
A vulnerability scan result
An infrastructure scan
Any random file or string
Etc.
Materials are sent during an attestation process.
Attestation
See Attestation Process.
An attestation is a unit of data sent to Chainloop. Users and CI systems use the Chainloop CLI to “craft” attestations, add materials to them, and “push” them to Chainloop service (the evidence store). Common commands are:
# initialize the attestation. Downloading the contract
> chainloop att init --workflow workflow-name --project project-name
# add materials to the attestation
> chainloop att add --value ghcr.io/chainloop-dev/chainloop/control-plane:latest
> chainloop att add --value reports/cyclonedx.json --kind SBOM_CYCLONEDX_JSON
# sign and push the attestation to chainloop
> chainloop att push --key cosign.key
Workflow
See Workflow.
A workflow represents a source of data to be sent to Chainloop. It usually corresponds to a CI pipeline, but it doesn't necessarily need to match. For example, users might send data from other sources, like a custom integration from Jira. Workflows are just an umbrella term for all data ingestions from the same source.
Compliance Primitives
Policy
See Policies.
Policies are rules evaluated against materials and/or the whole attestation document. They represent acceptance criteria for the system to ingest those materials. Even in failure cases (when there are policy violations), attestations are still sent to Chainloop but clearly marked as “not compliant.” This way, Chainloop keeps track of everything that is happening in the system, even if it's not acceptable. Policies are written in Rego language.
Requirements
Requirements are a high-level representation of Compliance criteria that the project must meet. They are not necessarily technical but written in high-level natural language by Compliance teams. It's the responsibility of SecOps teams to map high-level requirements into low-level policies.
Frameworks
Frameworks represent high-level regulatory standards or good practices. They are usually promoted by governments and required for companies to fulfill, such as SDDF, SOC2, CRA, etc.
Frameworks can also represent internal, custom checklists and normative for release management, security compliance, etc. In any case, Chainloop will help automate those by giving tools to manage and automate frameworks and requirements in terms of policies and data ingestions.
Exceptions
Sometimes, it’s acceptable for some organizations to release software without fulfilling all internal requirements. In these cases, Chainloop provides a way to register “exceptions” to those requirements, marking them as exempt and thus not counting against compliance criteria. Exceptions and their authors are recorded in the system for future auditing.
Workflow Contract
See Contracts.
A contract is the interface between development pipelines and the Chainloop service. It defines the materials that are expected to be sent to Chainloop and some additional constraints, like the type of source (Github, Dagger …, etc.) and the policies that must be evaluated.
A contract can also be seen as the interface between the developers who must instrument their CI/CD pipelines and the other teams.