Hi Junyi,
I'm part of the in-toto team and I just wanted to clarify a couple
of things. in-toto was designed specifically to be agnostic when
it came to these things -- it provides mechanisms for everything
you've described and isn't locked into any one platform or tool.
In the scenario you described, in-toto can be paired with a
vulnerability scanner of your choice to check if a resource has a
CVE associated with it. This check would be written in as an
inspection
(https://github.com/in-toto/docs/blob/master/in-toto-spec.md#432-inspections),
and would be performed during the verification workflow
pre-deployment. This can happen in a Kubernetes admission
controller, for instance.
Please feel free to ask me any questions. You can also direct any
in-toto specific questions to in-toto...@googlegroups.com.
- Aditya
--
You received this message because you are subscribed to the Google Groups "Grafeas Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to grafeas-user...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/grafeas-users/3b5be111-1512-4eb0-addd-178bf0c57301n%40googlegroups.com.