Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 226

Cosign

What is Cosign?

CosignAn open-source CLI from the Sigstore project for signing, verifying, and attesting to OCI artifacts and other software using either keyed or keyless workflows.


Cosign is the user-facing tool of the Sigstore stack. It can sign container images, OCI artifacts, blobs, SBOMs, and in-toto attestations and store signatures alongside the artifact or in an OCI registry. In keyless mode it relies on Fulcio to issue a short-lived certificate bound to an OIDC identity and records the signature in the Rekor transparency log; in keyed mode it uses traditional keys, hardware tokens, or KMS-backed keys. Verification policies can require trusted identities (e.g. a specific GitHub Actions workflow), reusable workflows, or attestation predicates. Cosign is the default signing tool in many CI pipelines and Kubernetes admission systems (Kyverno, Connaisseur, OPA Gatekeeper) for enforcing supply-chain integrity.

Examples

  1. 01

    cosign sign --identity-token $OIDC_TOKEN ghcr.io/org/app:v1.2

  2. 02

    Kyverno policy verifying that production images are signed by a specific GitHub Actions workflow.

Frequently asked questions

What is Cosign?

An open-source CLI from the Sigstore project for signing, verifying, and attesting to OCI artifacts and other software using either keyed or keyless workflows. It belongs to the Application Security category of cybersecurity.

What does Cosign mean?

An open-source CLI from the Sigstore project for signing, verifying, and attesting to OCI artifacts and other software using either keyed or keyless workflows.

How does Cosign work?

Cosign is the user-facing tool of the Sigstore stack. It can sign container images, OCI artifacts, blobs, SBOMs, and in-toto attestations and store signatures alongside the artifact or in an OCI registry. In keyless mode it relies on Fulcio to issue a short-lived certificate bound to an OIDC identity and records the signature in the Rekor transparency log; in keyed mode it uses traditional keys, hardware tokens, or KMS-backed keys. Verification policies can require trusted identities (e.g. a specific GitHub Actions workflow), reusable workflows, or attestation predicates. Cosign is the default signing tool in many CI pipelines and Kubernetes admission systems (Kyverno, Connaisseur, OPA Gatekeeper) for enforcing supply-chain integrity.

How do you defend against Cosign?

Defences for Cosign typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Cosign?

Common alternative names include: cosign.

Related terms