
2026-02-19
In this #KEYMASTER episode, Ben Dewberry, Product Manager, Signing and Key Management, joins Sven Rajala to discuss the status of code signing in Enterprises.
Enterprise signing has quietly but fundamentally changed. Not long ago, signing was often treated as a secondary concern, with ad hoc solutions implemented to meet immediate requirements. A developer or release engineer would log into a workstation, use a locally stored key file, and manually sign an MSI, DLL, JAR, or similar artifact before moving on. The objective was straightforward: ensure the file was signed so it could be distributed. Today, that model no longer holds.
Modern enterprises build and ship software through automated CI/CD pipelines. Signing is no longer a manual, one-off activity, it is a critical control point embedded deep into development workflows. Artifacts are signed automatically as part of pipeline stages, often without human intervention. This shift has raised the bar from how do I sign a file to how do I design signing as part of a secure, scalable delivery system.
As CI/CD pipelines became the norm, software packaging evolved alongside them. Applications are no longer delivered as standalone binaries alone. They are bundled into container images, deployed into Kubernetes clusters, and promoted across environments at high velocity. That changes the signing problem.
Enterprises now need to sign:
And just as importantly, they need to verify all of it before anything runs in production.
This is where container signing has seen rapid movement. The ecosystem has largely converged around Cosign, part of the Sigstore project under the Linux Foundation. Cosign introduced a modern, developer-friendly approach to signing container images, backed by transparency logs and short-lived identities. With Docker stepping away from Notary, Cosign has become the dominant model for container signing in practice.
Sigstore’s public trust model works well for open source and community-driven projects. But enterprise environments bring additional constraints.
Many organizations already operate a private PKI that underpins their internal trust model, issuing certificates for workloads, services, and users. When those same organizations deploy software internally, they often want:
Rather than replacing Sigstore-style workflows, enterprises increasingly want to integrate them with their own trust infrastructure. This is where enterprise signing platforms can bridge the gap, supporting Cosign-compatible workflows while keeping private keys protected, managed, and compliant with internal security requirements.
The real power of modern signing emerges when everything is connected.
A mature pipeline can:

Securing the CI/CD Supply Chain with Trusted Signatures
With Kubernetes policy engines, organizations can enforce rules such as: if this image wasn’t signed by our trusted PKI, it doesn’t run. This turns signing from a compliance checkbox into an active security control across the entire software supply chain.
Enterprises are also experimenting with different signing models:
The reality is not one-size-fits-all. Most organizations end up with a hybrid approach, balancing security, automation, and operational complexity.
Interest in post-quantum cryptography (PQC) is no longer theoretical, especially in regulated industries and IoT-heavy environments.
While many native signing tools are still catching up, there is growing demand for:
For many teams, this work starts in labs and pilots today, with an eye toward future-proofing signing workflows before standards and mandates fully land.
Enterprise signing is not just about cryptography anymore; it’s about designing trust into how software is built, shipped, and run.

