GitHub Actions
Pre-built actions for scanning, hardening, and signing images.
ImageSentinel integrates with your existing CI/CD pipelines, container registries, and Kubernetes clusters. No migration required.
Pre-built actions for scanning, hardening, and signing images.
Native GitLab integration with auto-generated pipelines.
Jenkins plugin for automated image hardening.
Orbs for seamless CircleCI integration.
# GitHub Actions
- name: Harden image
uses: imagesentinel/harden-action@v1
with:
image: my-app:latest
push-to: ghcr.io/myorg/my-app
sign: true
sbom: true# GitLab CI
harden:
image: imagesentinel/cli:latest
script:
- sentinel harden my-app:latest
--sign
--sbom
--push registry.gitlab.com/myorg/my-appPush hardened images directly to Docker Hub.
Native AWS ECR support with IAM integration.
Push to Google Container Registry or Artifact Registry.
Azure Container Registry integration.
Enterprise Harbor registry support.
JFrog Artifactory integration.
# Push to any OCI-compatible registry
sentinel harden my-app:latest \
--push 123456789.dkr.ecr.us-east-1.amazonaws.com/my-app:hardened \
--push gcr.io/my-project/my-app:hardened \
--push myregistry.azurecr.io/my-app:hardenedEnforce image signature verification at deployment time using admission controllers. ImageSentinel integrates with Kyverno, OPA Gatekeeper, and Sigstore Policy Controller.
# Kyverno policy for ImageSentinel images
apiVersion: kyverno.io/v1
kind: ClusterPolicy
metadata:
name: require-imagesentinel-signature
spec:
validationFailureAction: Enforce
rules:
- name: verify-signature
match:
resources:
kinds: [Pod]
verifyImages:
- imageReferences:
- "registry.imagesentinel.io/*"
attestors:
- entries:
- keyless:
issuer: "https://accounts.google.com"
subject: "*@imagesentinel.io"We support any OCI-compatible registry and CI/CD platform. Talk to our team about your requirements.