SLSA-aligned build provenance
Generates SLSA-compatible attestations as build artifacts. Programs can demonstrate SLSA Level 3 or Level 4 maturity to auditors and downstream consumers without retrofitting later.
Checkmarx • Application security
Checkmarx Software Supply Chain Security implements SLSA-aligned build provenance, Sigstore-compatible code signing, attestation, and SBOM lifecycle management so the AppSec program can prove what was built, by whom, and from what sources, end to end.
Through Merito, Checkmarx Software Supply Chain Security is wired up as SLSA-aligned attestation in the build, Sigstore-compatible signing, SBOM lifecycle management, and downstream verification policy so the supply chain produces audit-ready evidence rather than retrofit documentation.
What it is
Checkmarx Software Supply Chain Security is the build-and-release governance product inside the Checkmarx One Supply Chain pillar. It implements SLSA (Supply-chain Levels for Software Artifacts) build provenance attestation, Sigstore-compatible code signing, SBOM lifecycle management, and supply-chain attack-surface visualization. Where Malicious Package Protection blocks dependencies before the build and SCA scans dependencies after the build, Software Supply Chain Security covers the build itself: what was built, by what pipeline, from what sources, with what reviewers, signed by what key.
SLSA alignment is the load-bearing capability for regulated programs. SLSA defines four levels of build provenance maturity, with SLSA Level 3 typically required for federal and high-assurance commercial programs. Checkmarx generates SLSA-compatible attestations as build artifacts, so a downstream consumer can verify that this binary came from this commit, built by this pipeline, with these source dependencies. EO 14028, NIST SSDF, and supply-chain mandates increasingly require this evidence; programs without it have to retrofit later.
Sigstore-compatible signing closes the loop. Build artifacts get signed with short-lived keys backed by an OIDC identity, signatures get logged to a public transparency log (Rekor) or a private equivalent, and consumers verify signatures before deployment. The pattern eliminates long-lived signing keys that get stolen and forgotten and replaces them with verifiable, ephemeral signing tied to the actual identity that built the artifact.
What breaks Software Supply Chain Security adoption is partial implementation. Programs that turn on SLSA attestation but skip signing, or generate SBOMs but never verify them downstream, or sign artifacts but do not enforce signature verification at deployment end up with documentation rather than enforcement. Merito's engagement implements the full chain: build provenance generation, signing, transparency log, SBOM lifecycle, and downstream verification. Without that, the program ships SLSA Level 1 documentation and calls it Level 3.
Ideal use cases
What it is best at
Generates SLSA-compatible attestations as build artifacts. Programs can demonstrate SLSA Level 3 or Level 4 maturity to auditors and downstream consumers without retrofitting later.
Short-lived signing keys backed by OIDC identity, signatures logged to a transparency log, and downstream verification. Replaces long-lived signing keys that get stolen and forgotten.
SBOMs generated at build, attached to release artifacts, verified at deployment, and updated as dependencies change. Programs that generate SBOMs and never verify them downstream get documentation, not enforcement.
Maps upstream sources, build pipelines, signing infrastructure, and downstream consumers in one view. Programs see the full chain rather than treating each layer as a separate audit.
Pairs with Malicious Package Protection, Repository Health, and SCA inside Checkmarx One for end-to-end supply-chain governance from sourcing through deployment.
Core capabilities
Producing audit-ready evidence as part of the build, not retrofitted afterward.
SLSA attestation generation
Generates in-toto SLSA attestations as build artifacts. Captures source commit, builder identity, build instructions, and source dependencies.
Build-pipeline integration
Hooks into Jenkins, GitHub Actions, GitLab CI, Azure DevOps, and Tekton so attestation generation is part of the build, not a separate step.
SLSA Level mapping
Maps current pipeline practices to SLSA Levels and surfaces the gaps to higher levels.
Replacing long-lived keys with verifiable, ephemeral signing.
Sigstore-compatible signing
Short-lived signing keys backed by OIDC identity, with transparency logging to Rekor or a private equivalent.
Verification at deployment
Downstream verification policy enforced before deployment. Unsigned or invalidly-signed artifacts get rejected.
Artifact signing across registries
Container images, OCI artifacts, language-specific packages, and binary releases all get signed in the same flow.
SBOMs as evidence, not as a one-time export.
CycloneDX and SPDX SBOM generation
SBOMs generated at build in industry-standard formats, attached to release artifacts.
SBOM verification at deployment
Deployment-time verification that the SBOM matches the artifact and meets policy.
Supply-chain attack-surface map
Visualizes upstream sources, build pipelines, signing infrastructure, and downstream consumers in one view.
Cross-product correlation
Links to SCA, Malicious Package Protection, and Repository Health findings inside Checkmarx One.
Where it fits in the stack
Deployment and implementation
Licensing and packaging
Checkmarx One Enterprise (includes Software Supply Chain Security)
Enterprise bundle adding Software Supply Chain Security, AI agents (Developer Assist, Triage and Remediation), AI Supply Chain Security, and premium SLAs.
Best for: Enterprise programs with regulated supply-chain mandates and federal-aligned compliance posture.
Software Supply Chain Security add-on (Advanced bundle customers)
Software Supply Chain Security added to an existing Checkmarx One Advanced subscription without the full Enterprise bundle.
Best for: Programs piloting SLSA-aligned governance without a full Enterprise upgrade.
Merito services
Merito sells licenses and the delivery work around them. Pick the service that matches where you are in the lifecycle.
SLSA attestation wiring, signing infrastructure setup, transparency log configuration, SBOM lifecycle design, and verification policy.
Explore service02Supply-chain governance scoping for Software Supply Chain Security alongside Anchore, JFrog Xray, and in-house SLSA programs.
Explore service03Signed-build pipelines and verification policy embedded in CI/CD across the build fleet.
Explore service04Platform engineering enablement around SLSA, Sigstore, and SBOM discipline.
Explore service05Named engineer, priority SLAs, and release-time coverage for Software Supply Chain Security.
Explore service06Long-term run support including signing-infrastructure operation, SLSA attestation maintenance, and SBOM lifecycle evolution.
Explore service07Role-based training for DevSecOps architects, platform engineers, and compliance leads.
Explore service08Merito-placed AppSec engineers and Checkmarx specialists embedded on long-running programs.
Explore serviceCheckmarx Software Supply Chain Security licensing
Software Supply Chain Security pricing arrives with SLSA attestation wiring, Sigstore signing setup, SBOM lifecycle design, and downstream verification policy that turn supply-chain governance into enforcement rather than documentation.
Merito point of view
Merito has audited supply-chain governance programs that generated SBOMs nobody verified, signed artifacts nobody checked at deployment, and produced SLSA attestations that no downstream consumer ever read. The documentation existed; the enforcement did not. Software Supply Chain Security is useful only when the full chain runs end to end: attestation at build, signing with short-lived keys, transparency logging, SBOM attachment to artifacts, verification at deployment, and rejection of artifacts that fail the policy.
Merito recommends Software Supply Chain Security specifically when the program is subject to EO 14028, NIST SSDF, federal contracting requirements, or sector-specific supply-chain mandates. For programs without those drivers, the value is real but the urgency is lower; SLSA Level 1 or Level 2 is often a defensible baseline. Merito surfaces the actual compliance landscape during scoping rather than upselling SLSA Level 3 as a default.
Sigstore-compatible signing replaces long-lived signing keys, which are the single most common supply-chain incident shape. Programs that maintain RSA signing keys in HSMs and rotate them every two years are running on borrowed time; programs that use ephemeral keys backed by OIDC identity have already moved past that risk. The migration is not optional for high-assurance programs.
What buyers usually underestimate
Related from Merito
Related solutions
Related services
Related products
Frequently Asked Questions
Consultation request
Share your build-pipeline landscape, signing posture, and SLSA target. A Merito Checkmarx specialist follows up within one business day.
SLSA-aligned
SLSA-compatible attestations generated as part of the build. Audit-ready for EO 14028 and NIST SSDF.
Sigstore signing
Short-lived signing keys backed by OIDC identity. Long-lived signing keys are the most common supply-chain incident shape.
Next step
A Merito Software Supply Chain Security engagement implements the full SLSA chain end to end. Programs that generate attestations without downstream verification are documenting compliance, not delivering it.