TrigGuard
TRIGGUARD CI_CD_GOV

CI/CD Governance

Add authorization gates to your pipelines. Every critical action gets a signed receipt.

Pipelines Execute Critical Actions

Your CI/CD system deploys to production, applies infrastructure changes, publishes artifacts, and accesses secrets. These are high-risk, often irreversible actions.

TrigGuard adds a governance layer to your pipelines. Authorization happens at runtime, with cryptographic proof of every decision.

Platform Support

GitHub Actions

Native Action with OIDC authentication. Works with workflow artifacts and matrix builds.

GitLab CI

Pipeline integration with Job tokens. Works with protected environments.

CircleCI

Orb integration with context-based secrets management.

Jenkins

Pipeline library integration. Works with declarative and scripted pipelines.

What to Govern

deploy.release Production deployments, release promotions
infra.apply Terraform, Pulumi, CloudFormation changes
artifact.publish npm publish, docker push, registry uploads
secrets.access Vault reads, KMS decryption, credential retrieval
database.migrate Schema changes, data migrations

GitHub Actions Example

name: Protected Deploy

on:
  push:
    branches: [main]

jobs:
  deploy:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4

      - name: TrigGuard Authorization
        id: auth
        uses: trigguard/authorize@v1
        with:
          api-key: ${{ secrets.TRIGGUARD_API_KEY }}
          surface: deploy.release
          action: deploy-production

      - name: Deploy
        if: steps.auth.outputs.decision == 'PERMIT'
        run: |
          echo "Authorized by: ${{ steps.auth.outputs.receipt_id }}"
          ./deploy.sh

      - name: Store Receipt
        uses: actions/upload-artifact@v4
        with:
          name: trigguard-receipt
          path: ${{ steps.auth.outputs.receipt_path }}

Compliance & Audit

Every pipeline execution that touches a protected surface produces a signed receipt. Store receipts as artifacts. Verify them during audits.

SOC 2

Demonstrate change management controls with cryptographic evidence.

ISO 27001

Document access control and authorization for system changes.

FedRAMP

Prove authorization for configuration changes to production systems.

Internal Audit

Answer "who authorized this change?" with verifiable proof.

Add Governance to Your Pipeline

Start protecting critical actions in your CI/CD system. Integration takes 10 minutes.