Image Overview

Public Cosign Image vs. Minimus Hardened Cosign Image

Cosign Image Overview

The Cosign image bundles a minimal runtime base and the core signing and verification components: the cosign CLI binaries, attestation and signature clients, OCI registry glue, KMS integrations and certificate/metadata bundles, plus configuration and policy files required for automated signing and verification. The runtime is optimized for container execution (small surface, explicit entrypoint, TLS and crypto libraries present) rather than as a general-purpose OS image.

In containerized and production environments it is deployed in CI/CD runners, build agents, admission controllers, or sidecars to sign artifacts, produce attestations, and verify signatures at build or deploy time against configured key sources and transparency/logging endpoints. Typical workloads include automated image signing, signature verification during pull/deploy, and attestation generation for supply-chain audits.

Teams evaluate a Cosign hardened image when compliance or threat models demand reduced attack surface and strong build provenance: examples include immutable filesystem/least-privilege runtimes, stripped debug tooling, reproducible builds, and clear binary provenance to help meet secure or regulated environment controls.

Minimus Cosign Image

CIS
NIST
FIPS 140-3
STIG

The Minimus Cosign image differs from typical Cosign container images by being constructed from scratch with only the essential runtime components and libraries required to sign and verify artifacts. By excluding package managers, unnecessary shells, and ancillary tooling, the image substantially reduces its attack surface while remaining faster to start, lighter on disk and memory, and simpler to maintain and update in CI/CD pipelines.

The Minimus hardened Cosign image builds on that minimal base with hardening aligned to industry standards such as NIST SP 800-190 and CIS Benchmarks: secure defaults, reduced Linux capabilities, strict filesystem and permission controls (read‑only roots where applicable), and controls for process isolation and privilege separation. These measures make the image easier to operate securely, simplify compliance validation, and reduce the scope of vulnerability management for engineering and security teams.

Get Started

Try the Minimus Hardened Cosign Image

Get access to the Minimus platform, with thousands of hardened container images, supply chain protection, native compliance reporting, and seamless integrations to your existing development toolchain.
Secure, Minimal Container Images
Hardened to NIST and CIS standards with FIPS 140-3 and STIG ready images available.

Supply Chain Protection

Defend against malicious packages with advanced heuristic filtration

Custom Image Creation

Create your own hardened images with the packages, files and certs you need. Minimus handles updates automatically.

Get a Demo of Minimus

Just fill out the form, and we'll be in touch to schedule a demo of Minimus with one of our engineers.
Thank you! A member of our team will reach out shortly to schedule a personalized Minimus demo.
Oops! Something went wrong while submitting the form.
Frequently Asked Questions

Cosign Container Image FAQ

Answers to common questions about Cosign and the Minimus Hardened Cosign Image
What is the Docker sign?

The Docker sign is the practice of signing container images to prove provenance and integrity before deployment. It commonly uses Cosign, a Sigstore project, to attach cryptographic signatures to images and their metadata.

With signing, you can verify the signature after pulling the image, ensuring it came from a trusted source and has not been altered. A hardened Cosign image signature accompanies the image in the registry.

cosign sign myregistry/example/app:latest
cosign verify myregistry/example/app:latest
What is the cosign tool?

Cosign is an open-source tool from Sigstore that signs and verifies container images and their metadata, providing provenance and integrity via digital signatures and a transparency log.

Usage example:

cosign sign <image-name>
cosign verify <image-name>

For higher security, use a hardened Cosign image in your registry and require signed verification in your pipelines.

What is the difference between Sigstore and Cosign?

Sigstore is an ecosystem of tools for signing, verifying, and auditing software supply chains. It includes Fulcio (short‑lived signing certificates), Rekor (a transparency log), and clients that automate signing and verification. The aim is to give developers easy, verifiable provenance for artifacts.

Cosign is the signing and verification tool within Sigstore focused on container images and other artifacts. It signs with Fulcio, stores signatures in Rekor, and enables reproducible verification. When you sign a container image, you create a hardened Cosign image; verification checks the signature against the log.

Note: Sigstore and Cosign are complementary; enforce policies, rotation of signing keys, and verify provenance to strengthen supply-chain security in CI/CD pipelines.

Can I replace my Cosign image with the Minimus Hardened Cosign Image?
Yes. The Minimus Cosign image contains everything you need to run Cosign successfully.
Does Minimus offer FIPS 140-3 images?
Yes, Minimus images are hardened to CIS and NIST standards, with FIPS 140-3 and STIG ready variants available.