Supply Chain Security

As part of the http4k Enterprise Edition, every http4k artifact is published with cryptographically signed provenance, complete dependency transparency, and verified build attestations - giving your organisation the supply chain assurance it needs to ship with confidence.

With increasing regulatory pressure from the EU Cyber Resilience Act (CRA), US Executive Order 14028, NIST SSDF, and PCI DSS 4.0, organisations need to demonstrate full visibility into their software supply chain. http4k delivers this out of the box - every build produces SLSA Level 2 provenance linking artifacts to the exact source commit and CI pipeline, CycloneDX SBOMs detailing all transitive dependencies, and cosign signatures with trusted timestamps from the Sigstore Timestamp Authority.

What Gets Published#

For every http4k module, the following provenance artifacts are published as classified Maven artifacts alongside the standard JARs and POMs:

ArtifactDescription
CycloneDX SBOMMachine-readable bill of materials listing all transitive dependencies
JAR signatureCosign signature bundle for the compiled JAR
License reportCurated license compliance report for all dependencies
SLSA provenanceBuild L2 provenance attestation linking artifact to source commit and CI pipeline
Cosign bundlesSigstore signature bundle for each of the above, with trusted timestamps

See the Enterprise Repository reference for Maven coordinates, repository layout, and setup guides.

License Compliance#

Every http4k module includes a signed license compliance report listing the licenses of all transitive dependencies, checked against http4k’s curated approved license list. This gives your legal and compliance teams immediate visibility into the licensing of every component in your dependency tree.

Each report is signed with the same cosign key as all other provenance artifacts, and covers the specific module’s transitive dependencies - so you get exactly the license information relevant to the http4k modules you actually use.

SLSA Provenance Format#

Each provenance attestation follows the in-toto Statement v1 specification with a SLSA Provenance v1 predicate. The attestation links each artifact to:

  • The exact git commit that produced it
  • The GitHub Actions workflow that built it
  • The build invocation ID for full traceability
  • SHA-256 digests of all subject artifacts

SLSA Level 3 Provenance#

All http4k Enterprise Edition artifacts are published with SLSA Level 2 provenance as standard. For organisations with enhanced compliance requirements, we also offer SLSA Level 3 provenance on a per-customer basis.

SLSA Level 3 adds build platform isolation guarantees - artifacts are built on hardened, tamper-resistant CI infrastructure where the build process is fully isolated and cannot be influenced by project maintainers or external actors. This provides the highest level of supply chain assurance available.

To discuss SLSA Level 3 provenance for your organisation, contact us.

Verifying Artifacts#

The http4k Verify plugin provides automatic build-time verification of all http4k artifact signatures. It exports all verification artifacts (SBOMs, provenance, license reports, sigstore bundles) to your project directory for independent inspection, and generates a JSON attestation report as proof that your http4k dependencies were validated.

See the http4k Verify reference documentation for full setup, configuration, and usage details - including manual verification with cosign and Gradle’s built-in dependency verification.

SLSA Level 2 Provenance

Know exactly where every artifact came from. Each build is cryptographically linked to the source commit and CI pipeline that produced it, giving your security team complete traceability.

CycloneDX SBOMs

Stay ahead of compliance requirements with machine-readable Software Bills of Materials for every module, ready for audit and vulnerability scanning out of the box.

License Compliance

Signed, per-module license reports delivered with every artifact - ready for audit and regulatory review.

Frequently Asked Questions

  • How do I get access to the http4k Enterprise Repository?

    Repository credentials are included with your http4k Enterprise Edition subscription. Contact enterprise@http4k.org to get started.

  • What SLSA level do http4k artifacts achieve?

    All artifacts achieve SLSA Build Level 2 as standard. SLSA Level 3 provenance with build platform isolation is available on request for customers with enhanced compliance requirements.

  • Where do I get the public key for verification?

    The http4k signing keys are published at https://http4k.org/.well-known/cosign-keys.json. The http4k Verify plugin downloads this automatically. For manual verification, extract the public key from the key list document.

  • Are community (org.http4k) artifacts also covered?

    Yes. Both community (org.http4k) and pro (org.http4k.pro) artifacts published to the http4k Enterprise Repository include full provenance, SBOMs, and cosign signatures.

  • Where are provenance artifacts published?

    All provenance artifacts - SBOMs, signed JARs, license reports, and SLSA attestations - are delivered through the http4k Enterprise Repository at maven.http4k.org as part of your Enterprise Edition subscription.

Professional Services

Sustain

Your production systems need long-term stability and support. Our Enterprise Edition delivers LTS packages and direct access to the http4k team

Solve

We’ve designed http4k to be simple to work with, but getting professional advice about effectively using it from specialist experts can 🚀 your projects.

Educate

We provide hands-on training to help you get the most out of http4k. You can get help from the creators of http4k to learn how to use it effectively.

Let's talk

Contact us
pumb
scarf