Thalorin
Capabilities

Container Hardening, Pipeline Security & SBOM Management. Build software factories that generate compliance evidence as a byproduct of delivery. Iron Bank container hardening, security gates at every pipeline stage, and automated SBOM generation—without slowing down deployment velocity.

Abstract gradient
1,200+
Iron Bank containers
5 stages
Security gates
100%
SBOM coverage target

Big Bang component stack

Big Bang deploys a standardized set of security and observability tools onto any CNCF-certified Kubernetes cluster. Each component serves a specific compliance function—service mesh for encryption in transit, policy engines for admission control, logging for audit trails.

Thalorin maps Big Bang component health to specific RMF controls. When Istio mTLS degrades, the SC-8 control status updates. When Vault becomes unavailable, SC-12 and SC-28 alert.

Istio

Traffic management, mTLS encryption, load balancing between services

Kiali

Service mesh observability dashboard

Jaeger

Distributed tracing for request flow analysis

Iron Bank hardening process

Iron Bank contains 1,200+ pre-hardened container images rebuilt every 24 hours. When you need custom images—which you will—they must meet the same Container Hardening Guide standards.

Thalorin tracks container provenance across your deployments. Which Iron Bank images are you using? Which are custom? When do justifications expire?

1
Base image selection

Start from an approved Iron Bank base (UBI, Alpine, Chainguard). Never build FROM scratch or upstream Docker Hub.

2
Dockerfile hardening

Remove shells where possible. Run as non-root. Drop all capabilities. Set read-only root filesystem. No package managers in final image.

3
Vulnerability scanning

Scan with Twistlock/Prisma. Zero critical CVEs. High CVEs require documented justification or 14-day remediation plan.

4
Compliance scanning

Pass OpenSCAP checks against DISA STIG baseline. Every failed rule requires justification or fix.

5
Approval submission

Submit container to Iron Bank via MR to repo1. Automated pipeline runs all scans. Approval typically 2-4 weeks.

CVE Justification Types
False Positive:CVE doesn't apply to your usage (prove it)
Risk Accepted:AO accepts risk with compensating controls documented
Pending Fix:Upstream patch coming, tracked in POA&M
Cannot Fix:No fix available, compensating controls required

Security gates that produce evidence

Each pipeline stage runs specific security checks. The tools vary by organization, but the pattern is consistent: scan, enforce thresholds, block on failures, generate evidence.

Thalorin aggregates scan results from every tool in your pipeline into a unified evidence store. When assessors ask "how do you verify no critical CVEs in production?"—you have timestamped proof.

Click a gate to see security checks and evidence generated

SBOM generation & VEX

Executive Order 14028 requires SBOM delivery within 30 days of release. The practical challenge: generating accurate SBOMs for containerized applications with hundreds of transitive dependencies.

Thalorin integrates SBOM generation into your build pipeline, archives SBOMs by version, and correlates them with vulnerability data. When a new CVE drops, you know which deployments contain the affected package.

CycloneDX

OWASP

Designed for security. Native VEX support. Good for vulnerability correlation.

syftcdxgentrivy

SPDX

Linux Foundation

Strong license compliance. ISO standard (ISO/IEC 5962:2021). Broad ecosystem.

syftscancode-toolkittern

NTIA Minimum Elements (required)

1Supplier name
2Component name
3Component version
4Unique identifiers (PURL, CPE)
5Dependency relationships
6Author of SBOM
7Timestamp

VEX: Vulnerability Exploitability eXchange

SBOMs list what's in your software. VEX documents say whether reported vulnerabilities actually affect your deployment. "Yes, log4j is in the image, but the vulnerable code path isn't reachable." VEX prevents false-positive remediation panic.

Artifact signing & provenance

Code becomes container becomes deployment. At each step, cryptographic signatures prove the artifact wasn't tampered with. The cluster only runs images it can verify came from your pipeline.

Sigstore provides keyless signing—no key management burden. Cosign signs, Rekor provides transparency log, Fulcio issues ephemeral certificates tied to OIDC identity.

Code
Artifact: Commit
Sign: GPG signed commits
Verify: git verify-commit
Build
Artifact: Container image
Sign: Cosign / Notation keyless
Verify: cosign verify
Package
Artifact: Helm chart
Sign: Cosign attachment
Verify: cosign verify-blob
Deploy
Artifact: Admission
Sign: Policy engine check
Verify: Kyverno image verify

Admission enforcement: Kyverno or OPA Gatekeeper rejects any pod with unsigned or unverified images. The signature check happens at deploy time, every time.

Platform control inheritance

Platform One and similar software factories maintain their own ATO covering infrastructure controls. Tenant applications inherit these controls—you don't re-document how Istio works.

Thalorin maintains control inheritance mappings. When your SSP references platform-provided controls, we link to the authoritative platform documentation and track that the platform ATO remains valid.

Typically Inherited from Platform

AC
Access Control

Keycloak SSO, namespace RBAC, network policies

AU
Audit & Accountability

EFK stack, Loki, audit logging

CM
Configuration Mgmt

GitOps, ArgoCD, Helm value enforcement

SC
System & Comms Protection

Istio mTLS, cert-manager, network segmentation

SI
System & Info Integrity

Falco, container scanning, admission control

You're Still Responsible For:

  • Application-specific access control logic
  • Application-level logging (what your code logs)
  • Secrets your application uses (not how Vault works)
  • Application vulnerability remediation
  • SBOM for your application dependencies

Security that developers don't hate

The fastest way to undermine DevSecOps is to make security slow and opaque. Developers will work around tools that block them without explanation.

Good DevSecOps gives developers fast feedback, clear remediation guidance, and escape hatches when they need to accept risk. Security becomes a feature of the pipeline, not a gatekeeper outside it.

Fast feedback

Developers find issues in IDE or pre-commit, not 20 minutes into a CI run. Shift left means shift fast.

Clear remediation

Don't just say 'CVE-2024-1234 detected.' Show the package, the fix version, and the upgrade command.

Automated fixes

Dependabot/Renovate PRs for dependency updates. Don't make developers hunt for fixes.

Self-service exceptions

Developers can request risk acceptance with justification. Security reviews, not security blocks.

Thalorin's role: We don't run the scans—your pipeline tools do. We aggregate the results, track exceptions, and present the evidence in formats assessors understand. Developers use their tools; compliance gets its artifacts.

Software factory capabilities

Pipeline evidence aggregation

Collect scan results from GitLab, Jenkins, GitHub Actions

Iron Bank tracking

Monitor container provenance and approval status

SBOM management

Store, version, and query SBOMs by deployment

VEX document generation

Create exploitability statements for false positives

Control inheritance mapping

Link tenant SSP to platform control documentation

Justification workflow

Track CVE exceptions with expiration and renewal

Big Bang health monitoring

Component status tied to control families

Deployment compliance gates

API for admission webhooks to query Thalorin

Ready to build a compliant software factory?

See how Thalorin integrates with your CI/CD pipeline to track security evidence from commit to production—without adding friction for developers.