Build Secure Multi-Arch Images, Sign, Scan & Deploy with GitHub Actions + Cosign + Trivy
Sep 26, 2025 - MidLevel
$1,450.00 Fixed
Strategic Gap
Your start-up has 12 micro-services (Node, Python, Go) built by different teams. Images are >1 GB, sometimes root-user, no SBOM, no signature, and vulnerabilities are discovered post-deployment. Investors now require software supply-chain compliance ( NTIA SBOM, SLSA L3 roadmap). You need a standardized, secure, CI-native container factory that developers love and auditors accept.
Compliance & Performance Targets
- Image size ≤ 120 MB (from ~1.2 GB).
- Zero CVE > HIGH in base images; <5 MEDIUM in final layer.
- Signed images ( Cosign ) + SBOM ( Syft ) attached in registry.
- Multi-arch ( amd64 + arm64 ) for Apple M1 laptops and Graviton savings.
- Non-root user, read-only root filesystem, distroless where possible.
End-to-End Scope I Will Deliver
- Base-Line Assessment
- Dockerfile audit matrix: image size, layer count, USER directive, package manager.
- Trivy scan baseline JSON → CVE count per severity.
- Golden Dockerfile Templates
- Multi-stage pattern: builder (compile) → tester (unit) → runtime (distroless or alpine).
- ARG targets for amd64/arm64 (TARGETARCH, BUILDPLATFORM).
- USER 65534 (non-root) + HEALTHCHECK + LABEL metadata (version, commit SHA, build date).
- CI/CD Pipeline (GitHub Actions)
- Matrix strategy builds both architectures in parallel ( QEMU + Docker Buildx ).
- Cache mounts (type=cache,target=/root/.cache) → build time −40 %.
- Trivy scan gates: job fails if CVE > HIGH; SARIF uploaded to GitHub Security tab.
- Cosign keyless signing ( OIDC federated ) → attestation stored in GHCR.
- Syft generates SPDX JSON SBOM → attached to OCI manifest.
- Registry & Signing Setup
- GitHub Container Registry ( GHCR ) enabled for organisation.
- OIDC trust between GitHub and GHCR → no long-lived passwords.
- Cosign public key uploaded to .well-known/cosign.pub for manual verification.
- Supply-Chain Verification
- Policy-controller ( Kubernetes optional ) validates signature + SBOM before admission.
- SLSA provenance generated ( GitHub native ) → L2 achieved ( L3 roadmap document).
- Developer Experience & Rollout
- README template: how to build, scan, sign locally.
- Makefile shortcuts: make build, make scan, make sign.
- Brown-bag session ( 45 min Zoom ) recording for engineering teams.
- Enterprise-Grade Deliverables
- Golden Dockerfile templates ( Node, Python, Go ) + GitHub Actions workflow YAML.
- Registry ( GHCR ) organisation setup + OIDC federation Terraform.
- SBOM & attestation examples ( JSON ) + verification script (cosign verify …).
- Compliance evidence: Trivy scan, SARIF, SLSA provenance JSON files signed.
Why a Mid-Level Specialist is Critical
- Cosign & Trivy deep knowledge → avoids supply-chain attacks.
- Multi-arch + QEMU experience → prevents Graviton surprises.
- 30-day post-delivery support ( shared Slack channel ) for new micro-services onboarding.
- United States
- Proposal: 0
- Verified
- Less than a week

Jessica Williams
, United States
Member since
Aug 5, 2025
Total Job
4
Last seen