K2view provides cryptographic signatures for all supported Fabric and Studio container images and Fabric packages to allow customers to independently verify:
This capability supports enterprise security controls, supply-chain security requirements, and regulated or air-gapped environments.
The detailed verification procedures are documented separately on the K2view Support Portal: https://support.k2view.com/signatures
This document explains what is signed, how the system works conceptually, and how customers should use the verification materials.
K2view signs the following deliverables:
Each image is signed using its immutable cryptographic digest (SHA-256).
Each package is signed using the digest of the final packaged file, after it is fully assembled.
K2view signs the digest, not the filename or tag.
K2view uses Cosign, an industry-standard signing tool widely adopted in the Kubernetes and cloud-native ecosystem.
The verification process differs slightly depending on artifact type, but follows the same logical flow:
The exact commands and tooling are documented on the Support Portal: https://support.k2view.com/signatures
This separation ensures:
For container images, signature metadata is embedded directly in the image as labels.
These labels indicate:
This allows customers to verify an image using only the image itself and the referenced metadata.
Because packages do not support embedded metadata, K2view provides:
These files are distributed alongside the package and referenced in the Support Portal documentation.
In the event of a failure, customers should stop using the image or package and contact K2view Support to inform us.
K2view provides cryptographic signatures for all supported Fabric and Studio container images and Fabric packages to allow customers to independently verify:
This capability supports enterprise security controls, supply-chain security requirements, and regulated or air-gapped environments.
The detailed verification procedures are documented separately on the K2view Support Portal: https://support.k2view.com/signatures
This document explains what is signed, how the system works conceptually, and how customers should use the verification materials.
K2view signs the following deliverables:
Each image is signed using its immutable cryptographic digest (SHA-256).
Each package is signed using the digest of the final packaged file, after it is fully assembled.
K2view signs the digest, not the filename or tag.
K2view uses Cosign, an industry-standard signing tool widely adopted in the Kubernetes and cloud-native ecosystem.
The verification process differs slightly depending on artifact type, but follows the same logical flow:
The exact commands and tooling are documented on the Support Portal: https://support.k2view.com/signatures
This separation ensures:
For container images, signature metadata is embedded directly in the image as labels.
These labels indicate:
This allows customers to verify an image using only the image itself and the referenced metadata.
Because packages do not support embedded metadata, K2view provides:
These files are distributed alongside the package and referenced in the Support Portal documentation.
In the event of a failure, customers should stop using the image or package and contact K2view Support to inform us.