Conceptual
            
                
                    
                        Chainguard Glossary
                        
                            
                        
                    
                    
                        
                            
                        
                    
                    
                        
                            
                        
                    
                    
                        
                            
                        
                    
                    
                        
                            
                        
                    
                    
                        
                            
                        
                    
                    
                        
                            
                        
                    
                    
                        
        Software supply chain security vocabulary
                    
                
                    
                        Overview of Assumable Identities in Chainguard
                        An overview of what assumable identities are and how they can be used with Chainguard assets.
                    
                
                    
                        What is OpenVex?
                        A conceptual overview of OpenVex
                    
                
                    
                        Verifying Chainguard Images and Metadata Signatures with Cosign
                        A walkthrough of verifying Chainguard Images and metadata signatures with Cosign.
                    
                
                    
                        Using the Chainguard Images Directory
                        A walkthrough of the Chainguard Images directory.
                    
                
                    
                        Strategies for Minimizing your CVE Risk
                        A conceptual article outlining best practices for reducing one's CVE risk.
                    
                
                    
                        Verified Organizations
                        An overview of how to verify your organization and the implications
                    
                
                
    
            
          
