Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 870

Provenance Attestation

What is Provenance Attestation?

Provenance AttestationA signed, machine-verifiable statement that describes how a software artifact was produced - including source, build system, parameters, and dependencies - so consumers can trust its origin.


A provenance attestation answers the question "where did this artifact come from?" with cryptographic evidence rather than trust by convention. Standard formats include in-toto attestations and SLSA Provenance v1, which capture the source repository commit, build platform, recipe, materials, and timestamps and are signed by the builder. Consumers verify attestations against a policy: trusted builder identity, allowed source repos, expected workflow, SLSA level, and so on. Tools such as Sigstore Cosign, GitHub Actions, Tekton Chains, GitLab CI, and SLSA-compliant build platforms generate attestations automatically. Provenance is a key control to detect tampered binaries and to enforce regulatory expectations like US EO 14028 and the EU Cyber Resilience Act.

Examples

  1. 01

    SLSA Provenance v1 generated by a GitHub reusable workflow and verified at deploy time.

  2. 02

    Kyverno policy requiring trusted-builder provenance on every container image.

Frequently asked questions

What is Provenance Attestation?

A signed, machine-verifiable statement that describes how a software artifact was produced - including source, build system, parameters, and dependencies - so consumers can trust its origin. It belongs to the Application Security category of cybersecurity.

What does Provenance Attestation mean?

A signed, machine-verifiable statement that describes how a software artifact was produced - including source, build system, parameters, and dependencies - so consumers can trust its origin.

How does Provenance Attestation work?

A provenance attestation answers the question "where did this artifact come from?" with cryptographic evidence rather than trust by convention. Standard formats include in-toto attestations and SLSA Provenance v1, which capture the source repository commit, build platform, recipe, materials, and timestamps and are signed by the builder. Consumers verify attestations against a policy: trusted builder identity, allowed source repos, expected workflow, SLSA level, and so on. Tools such as Sigstore Cosign, GitHub Actions, Tekton Chains, GitLab CI, and SLSA-compliant build platforms generate attestations automatically. Provenance is a key control to detect tampered binaries and to enforce regulatory expectations like US EO 14028 and the EU Cyber Resilience Act.

How do you defend against Provenance Attestation?

Defences for Provenance Attestation typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Provenance Attestation?

Common alternative names include: SLSA provenance, Build provenance.

Related terms

See also