Google Open Source Security

sigstore as a globally adopted signing and verification standard

Design research, strategy and development for Google sigstore, a globally adopted signing and verification standard, since named by the White House as a key global security infrastructure.

A diagram in white on a navy blue background that illustrates the idea of vulnerabilities entering the software that supports a website.
“Working with IF is a pleasure. Their high quality of work, unique methodologies and ways of working meant we could accelerate our products in a way that I’ve not seen with other teams.”

[.quote-author]Product Manager, Google Open Source Security[.quote-author]

Problem

Today, software is mostly insecure. From a business perspective, insecure software is more expensive to maintain and consume - for everyone. Making software safer requires trust and adoption from developers globally. But trust is hard to earn.

Google, along with collaborators across the Open Source Software security community, have been developing tools to improve software security and therefore reduce costs, including for themselves. But to make these tools really successful, Google needed to make them understandable, usable and useful for more organisations.

We began working with the sigstore team. They had code, a basic website and a big ambition. Sigstore offers a responsible technology that has the potential to radically improve supply chain security. Although it was in early-stage development, we thought it could become infrastructure for the internet if widely adopted.

Our job was to understand why technical teams would use sigstore, what was stopping them from doing so, and how to translate the existing plans into something more user centred and accessible. Ultimately we wanted sigstore to be a trusted standard for signing and verifying software.

A peach background with a black line drawing for the sigstore logo, and the sigstore name written in lower case in a sans serif font.
New sigstore identity

Our approach

Design research

We wanted to understand the open source developer community and their needs for software signing. We made prompts and took them into exploratory research sessions to test ideas and uncover insights. We emphasised speaking to historically under-represented developers upfront in our research to ensure that what we design supported their needs, to scale the ambition of the different products and services. This work expanded the sigstore’s team awareness and knowledge of their ecosystem of users, and what they needed. We gathered insights that drove the wider strategy, which established sigstore at the leading edge.

Alongside this research we expanded our field of view to include the wider ecosystem of Sigstore users and stakeholders. Working closely with the Sigstore team, we set up a participatory and open approach to the project to build credibility and alleviate any concerns about how an open source project was sponsored by a private business.

A diagram with concentric circles showing the ecosystem of users organised into 3 groups.

Hype free digital strategy

Over the course of a discovery and following beta we developed a digital strategy for sigstore that focussed on:

  • helping users understand the benefits and uses of sigstore
  • how it could be made most accessible
  • what it meant to set the open source project up for success, in the long term. 

This strategy was also made available to the open source community, and helped create and maintain alignment.

Prototype of a concept that shows what trust indicators could look like in third party software. The concept is called sig checker and it shows software that has been scanned, with a result that shows a warning. // Prototype of a concept that shows how sigstore could integrate with github. The concept shows a screenshot from a github page, with a callout showing that this code has passed a sigstore check.
Low-fi concepts: (left) integrating sigstore with Github and (right) trust indicators in third-party software.

Full stack design and development

Over the course of several projects we designed, wrote content and built sigstore.dev. This increased credibility, trustworthiness, and clarity of purpose around sigstore while providing opportunity for continued improvement. 

We also made docs.sigstore.dev and a process for contribution. For the first time the Sigstore community had an easy way to engage and contribute. Adoption took off. The work continued as we also helped the Sigstore team with similar work on slsa.dev and security scorecards.

A flow diagram showing how tools like transparency logs and artifact signing can be published and monitored to help developers and end users.
The software supply chain is made secure by trustworthy tools and log.

Outcomes

The sigstore team made a global impact. With their revised proposition, website and tooling companies like Github and Kubernetes adopted sigstore and the project saw >100% growth in active contributors. The open source community grew to over 70 orgs and 500+ individuals contributing to +10M log entries. Adoption continues to grow.

Screenshots of sigstore’s new website including the home page, how sigstore works, what makes sigstore different and our foundations of trust.
Pages from sigstore’s new website.

Sigstore continues to be incorporated into a range of programming languages and developer ecosystems, and it was quoted by the White House presidential order as a key infrastructure project for global security. It now secures a software marketplace valued at $2B+.

"Sigstore has rapidly become the standard for signing, verifying, and protecting software"

[.quote-author]TechCrunch[.quote-author]

While this work is delivered in the form of products and services, the issues they touch on represent deep, philosophical change at a systems level. They influence and inform bigger policy decisions that sit across company and state boundaries.

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

This is some text inside of a div block.

Get in touch

Looking to reduce risk in a product? Have an idea you want to realise?

Book a call  →