{"id":47580,"date":"2025-11-03T09:00:00","date_gmt":"2025-11-03T17:00:00","guid":{"rendered":""},"modified":"2025-10-31T13:45:24","modified_gmt":"2025-10-31T20:45:24","slug":"enhancing-software-supply-chain-security-with-microsofts-signing-transparency","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/","title":{"rendered":"Enhancing\u00a0software\u00a0supply chain security with Microsoft&#8217;s Signing Transparency"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Today, Microsoft is announcing the preview of Signing Transparency to address software supply chain threats that traditional code signing alone cannot fully prevent, building on the Zero Trust principle of \u201c<em>never trust, always verify.<\/em>\u201d Signing Transparency uses an append-only log to verifiably record each signature, with keys protected in a secure confidential computing enclave. This allows organizations and auditors to independently verify cryptographic proof of service releases, improving security and accountability. Enhanced transparency ensures direct visibility into enforced security policies for every release, increasing trust and tamper-evidence across enterprise deployments.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/aka.ms\/MSTPreviewSignUp\" target=\"_blank\" rel=\"noreferrer noopener\">Sign up for Microsoft&#8217;s Signing Transparency preview<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"need-for-transparency-in-the-software-supply-chain\">Need for transparency in the software supply chain<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Modern software supply chain security faces sophisticated threats. Attackers have repeatedly exploited the trust in <a href=\"https:\/\/azure.microsoft.com\/en-us\/products\/trusted-signing\" target=\"_blank\" rel=\"noreferrer noopener\">signed software<\/a>\u2013from compromised build systems to stolen code-signing certificates\u2013to distribute malicious updates. In fact, what is needed is a mechanism to make code signing <strong>verifiable and accountable at scale<\/strong>, so that any unexpected changes become evident.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">When it comes to software, Signing Transparency means every signed artifact signature is recorded in a tamper-evident, open source, publicly accessible ledger. This way, anyone can later query and audit the ledger to confirm <em>when<\/em> and <em>what<\/em> was signed, and <em>by whom<\/em>, including the ledger itself, making it much harder for attackers to hide malicious signatures.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Transparency logs help extend trust in cases where code signing cannot, especially when paired with Trusted Execution Environments (TEE). For example, if an adversary manages to steal or misuse a trusted signing key, they could sign malware with a perfectly valid signature. A transparency service forces an adversary to hide from the log (raising red flags) or make their attack indelibly visible. In other words, even if attackers compromise signing keys, they cannot cover their tracks\u2013any tampering or unexpected signing can be detected, by any party, via the transparency log. This significantly boosts confidence in the software supply chain\u2019s integrity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-microsoft-s-signing-transparency\">What is Microsoft\u2019s Signing Transparency?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft\u2019s Signing Transparency is a cloud-managed service designed to enhance trust and security in software supply chains. At its core, it acts as an impartial notary for software signatures, creating a permanent, auditable record of who signed what and when. By doing so, it provides independent verification that a given software release has not been secretly replaced or modified and that all signing events follow expected patterns.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Specifically, it maintains a public, append-only ledger of software signing events, leveraging strong cryptography and confidential hardware to ensure the ledger\u2019s integrity for external users. Whenever software is signed (for example, an application binary, a container image, a firmware update, etc.), the signature is submitted to the Signing Transparency service. The service uses policies to verify and record a reference signature in an immutable log (captured as a Merkle tree) and signs them with a key that is created in and can never leave a secure confidential computing enclave, issuing a universally verifiable, tamper-proof receipt as evidence of the event.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This service utilizes COSE (CBOR Object Signing and Encryption) envelopes which are compliant with the Draft IETF standard for Supply Chain Integrity, Transparency, and Trust (SCITT), underlining Microsoft\u2019s commitment to open standards in supply chain security.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Countersigning COSE envelopes<\/strong><\/td><td><strong>Immutable Merkle tree ledger<\/strong><\/td><td><strong>Receipts for auditing and compliance<\/strong><\/td><\/tr><tr><td>Signing Transparency can add a receipt for digital signatures packaged as COSE envelopes (an IETF standard format. By adding its own signature to signed artifacts envelope, it creates a second layer of attestation. Any modification to the artifact or its original signature would break this countersignature, making tampering immediately detectable. This ensures the integrity of the signed object is independently verifiable. <\/td><td>All counter signed records are kept in an append-only ledger implemented as a Merkle tree. Each new signing even becomes a leaf in the tree, and the tree&#8217;s root hash is cryptographically updated. The Merkle structure provides a compact, verifiable proof of inclusion for each entry. Further, no entry can be altered or removed without breaking the cryptographic links, giving strong guarantees of immutability and transparency.<\/td><td>For every submitted signature, the service issues a transparent statement receipt (i.e. cryptographic receipt). This receipt contains proof that the signature was logged (including the Merkle tree root and inclusion proof) and is signed by the transparency service. Organizations can store these receipts as evidence for compliance audits, and anyone can later use them to independently verify that an artifact&#8217;s signature was indeed recorded in the ledge at a specific time.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"how-does-it-work-in-practice\">How does it work in practice?<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">When a developer or automated build system signs a piece of code, the signing service generates a COSE_Sign1 signature envelope, a compact binary signing format and <a href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc9052.html\" target=\"_blank\" rel=\"noreferrer noopener\">RFC 9052 industry standard<\/a>, containing signature, metadata, and the payload. That signed object (the <em>COSE envelope<\/em>) is then sent to the Signing Transparency service. The service verifies the signature and the signer\u2019s identity against its trust policy, then appends a countersignature to the COSE envelope. This countersignature does not replace the original\u2014it <em>augments<\/em> it with Microsoft\u2019s attestation and a pointer to the immutable ledger and the cryptographic inclusion proof.<\/p>\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/11\/GetAttachmentThumbnail-1024x576.webp\" alt=\"The workflow of how a service is made transparent through Microsoft's signing transparency.\" class=\"wp-image-47623 webp-format\" srcset=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/11\/GetAttachmentThumbnail-1024x576.webp 1024w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/11\/GetAttachmentThumbnail-300x169.webp 300w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/11\/GetAttachmentThumbnail-768x432.webp 768w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/11\/GetAttachmentThumbnail.webp 1306w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/11\/GetAttachmentThumbnail-1024x576.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">When the service commits an entry to its ledger, under the hood, this ledger is backed by Microsoft\u2019s <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/confidential-ledger\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">Confidential Ledger<\/a> and <a href=\"https:\/\/microsoft.github.io\/CCF\/main\/\" target=\"_blank\" rel=\"noreferrer noopener\">Confidential Consortium Framework<\/a> (CCF) running in a TEE. Each entry typically includes metadata such as a hash of the signed artifact, the original signature, the signer&#8217;s identity, and the countersignature. The ledger uses a Merkle tree data structure, so when the new entry is added, a new Merkle root is computed. The service cryptographically signs this root and packages it (along with the path of hashes proving the entry\u2019s inclusion) into the <strong>receipt<\/strong> returned to the user. The receipt essentially says, <em>\u201cWe, the transparency service, have recorded your artifact\u2019s signature at position X in our log (with root hash Y). Here is the proof and our signature to vouch for it.\u201d<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Because the receipt is a signed proof of inclusion, and the ledger is backed by confidential computing, verification proves the object passed the log\u2019s trust policy, and the signing event was logged for every participant\u2014be it an automated deployment system, an auditor, or an end-user\u2014to see and independently verify.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-signing-transparency-enhances-security-and-trust\">How Signing Transparency enhances security and trust<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Implementing Signing Transparency offers enterprises substantial security through:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Tamper-evident releases:<\/strong> All software builds and updates must be logged, making any unauthorized or modified release immediately detectable. The immutable logs ensure artifacts have not been secretly altered.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Independent verification:<\/strong> Customers and partners can verify software authenticity locally using transparency receipts, eliminating sole reliance on vendors or distribution channels.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Audit trail and compliance:<\/strong> Every software component is linked to a signed receipt, providing clear evidence for compliance audits and incident investigations. Logs can be monitored for anomalies.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Policy enforcement and accountability:<\/strong> Transparency services enforce logging policies and retain records of signing actions, deterring insider threats, and ensuring accountability for policy violations.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Protection against key compromise and replay:<\/strong> Any use of a compromised signing key is visible in the log, and freshness proofs prevent rollback attacks by verifying the latest versions.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Extended to firmware and hardware:<\/strong> The same principles apply to firmware and hardware, supporting supply chain integrity across all technology layers, from servers to IoT devices, with initiatives like OCP-SAFE and Caliptra enabling verification.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"why-verifiable-code-integrity-and-transparency-are-essential-for-software-supply-chain-security\">Why verifiable code integrity and transparency are essential for software supply chain security<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">With software supply chain attacks on the rise, organizations need proof of integrity and fast detection methods. Microsoft\u2019s Signing Transparency service advances this by attaching a verifiable record to each signed artifact, promoting trust through transparency. For enterprises, adopting this technology enables direct verification of code, reduces risk, builds customer confidence, and deters tampering by keeping malicious actions on record.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"i-m-interested-how-can-i-learn-more\">I\u2019m interested! How can I learn more?<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Join the preview community for a virtual chat by expressing interest <a href=\"https:\/\/aka.ms\/MSTPreviewSignUp\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft is announcing the preview of Signing Transparency to address software supply chain threats that traditional code signing alone cannot fully prevent, building on the Zero Trust principle of \u201cnever trust, always verify.\u201d Signing Transparency uses an append-only log to verifiably record each signature, with keys protected in a secure confidential computing enclave.<\/p>\n","protected":false},"author":97,"featured_media":47585,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1459],"tags":[2588,1479],"audience":[3054,3057,3053],"content-type":[1465],"product":[2578],"tech-community":[],"topic":[],"coauthors":[21],"class_list":["post-47580","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-azure-built-in-security","tag-azure-confidential-computing","audience-business-decision-makers","audience-data-professionals","audience-it-decision-makers","content-type-announcements","product-azure-security","review-flag-alway-1680286580-106","review-flag-iot-1680286585-835","review-flag-microsofts","review-flag-never-1680286580-606","review-flag-new-1680286579-546"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Signing Transparency: Secure Software Supply Chains | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"Microsoft Signing Transparency delivers verifiable code integrity and tamper-evident software releases for stronger supply chain security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Signing Transparency: Secure Software Supply Chains | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"Microsoft Signing Transparency delivers verifiable code integrity and tamper-evident software releases for stronger supply chain security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-03T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/10\/Yoast-SEO-Social-Image-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mark Russinovich\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/10\/Yoast-SEO-Social-Image-2.png\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Russinovich\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/mark-russinovich\/\",\"@type\":\"Person\",\"@name\":\"Mark Russinovich\"}],\"headline\":\"Enhancing\u00a0software\u00a0supply chain security with Microsoft&#8217;s Signing Transparency\",\"datePublished\":\"2025-11-03T17:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/\"},\"wordCount\":1317,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/10\/Signing-Transparency_Header.webp\",\"keywords\":[\"Azure Built-In Security\",\"Azure confidential computing\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/\",\"name\":\"Microsoft Signing Transparency: Secure Software Supply Chains | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/10\/Signing-Transparency_Header.webp\",\"datePublished\":\"2025-11-03T17:00:00+00:00\",\"description\":\"Microsoft Signing Transparency delivers verifiable code integrity and tamper-evident software releases for stronger supply chain security.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/10\/Signing-Transparency_Header.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/10\/Signing-Transparency_Header.webp\",\"width\":1260,\"height\":708,\"caption\":\"An illustration of a computer uploading.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Enhancing\u00a0software\u00a0supply chain security with Microsoft&#8217;s Signing Transparency\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/3e9f4d4812aeb783f3c2834b9eb5188f\",\"name\":\"katelynkrulek\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f5ee5f76867d2e8368748e286e36150eab18fdd3870c8871f173bb8b935de690?s=96&d=mm&r=g88277f7b87e9ec2febede3e929dedc30\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f5ee5f76867d2e8368748e286e36150eab18fdd3870c8871f173bb8b935de690?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f5ee5f76867d2e8368748e286e36150eab18fdd3870c8871f173bb8b935de690?s=96&d=mm&r=g\",\"caption\":\"katelynkrulek\"},\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/katelynkrulek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Signing Transparency: Secure Software Supply Chains | Microsoft Azure Blog","description":"Microsoft Signing Transparency delivers verifiable code integrity and tamper-evident software releases for stronger supply chain security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Signing Transparency: Secure Software Supply Chains | Microsoft Azure Blog","og_description":"Microsoft Signing Transparency delivers verifiable code integrity and tamper-evident software releases for stronger supply chain security.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2025-11-03T17:00:00+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/10\/Yoast-SEO-Social-Image-2.png","type":"image\/png"}],"author":"Mark Russinovich","twitter_card":"summary_large_image","twitter_image":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/10\/Yoast-SEO-Social-Image-2.png","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Mark Russinovich","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/mark-russinovich\/","@type":"Person","@name":"Mark Russinovich"}],"headline":"Enhancing\u00a0software\u00a0supply chain security with Microsoft&#8217;s Signing Transparency","datePublished":"2025-11-03T17:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/"},"wordCount":1317,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/10\/Signing-Transparency_Header.webp","keywords":["Azure Built-In Security","Azure confidential computing"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/","name":"Microsoft Signing Transparency: Secure Software Supply Chains | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/10\/Signing-Transparency_Header.webp","datePublished":"2025-11-03T17:00:00+00:00","description":"Microsoft Signing Transparency delivers verifiable code integrity and tamper-evident software releases for stronger supply chain security.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/10\/Signing-Transparency_Header.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/10\/Signing-Transparency_Header.webp","width":1260,"height":708,"caption":"An illustration of a computer uploading."},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhancing-software-supply-chain-security-with-microsofts-signing-transparency\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Enhancing\u00a0software\u00a0supply chain security with Microsoft&#8217;s Signing Transparency"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/3e9f4d4812aeb783f3c2834b9eb5188f","name":"katelynkrulek","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f5ee5f76867d2e8368748e286e36150eab18fdd3870c8871f173bb8b935de690?s=96&d=mm&r=g88277f7b87e9ec2febede3e929dedc30","url":"https:\/\/secure.gravatar.com\/avatar\/f5ee5f76867d2e8368748e286e36150eab18fdd3870c8871f173bb8b935de690?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f5ee5f76867d2e8368748e286e36150eab18fdd3870c8871f173bb8b935de690?s=96&d=mm&r=g","caption":"katelynkrulek"},"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/katelynkrulek\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/47580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/97"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=47580"}],"version-history":[{"count":13,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/47580\/revisions"}],"predecessor-version":[{"id":47627,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/47580\/revisions\/47627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media\/47585"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=47580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=47580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=47580"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=47580"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=47580"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=47580"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=47580"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=47580"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=47580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}