Reference
Network Requirements
Using Chainguard Images with firewalls, access control lists, and proxies
Overview of the Chainguard IAM ModelOverview of Chainguard Identity and Access Management
Rego PoliciesWriting Rego-based policies for Sigstore Policy Controller
CISA Secure Software Development Attestation Form (Draft)Secure Software Development Framework (SSDF) Table, NIST SP 800-218Minimum Attestation ReferencesChainguard Images End-of-Life NotificationsUser notifications for end-of-life events related to Chainguard Images