It's not radical.
It's obvious.
We're missing a big piece of security right at the entrance. We've been hanging out season passes (static creds) to kids with backpacks full of who knows what.
We can check those bags. We have the technology.
Check the Bag: The Meme You Cant Unsee
Old security: “Check IDs.”
New security: “Check IDs and the bag.”
The meme is the message. We don’t just ask who is calling our systems—we open the bag and prove what’s inside. And that bag must contain only policy-approved tooling, cryptographically attested, no surprises, no freebies.
Call it EnvSecOps if you want a name. Practically, it’s the painfully obvious next step:
No attested, policy-approved bag → no token.
What “the Bag” Actually Means
- The bag = the execution environment: image, toolchain, configs, helper scripts.
- Policy-approved = explicit allowlist: pinned digests, permitted binaries, known configs.
- Attested = cryptographically proven: signed statements that the environment only contains those allowed artifacts.
If anything unapproved is in the bag? Deny.
If the bag can’t prove itself? Deny.
No vibes. No :latest. No “temporary” helper scripts.
Before
[ Bouncer ] — “ID, please"
|
v
[ Verify WHO ] - "Present Static Cred"
|
v
[ Season Pass ]
After
[ Door ] — “ID, please… now open the bag.”
| \
v v
[ Verify WHO ] [ Verify WHAT = Only Approved Tooling ]
\ /
\_________/
[ Wristband (short-lived, scoped) ]
Doh.
You still keep IAM, SCPs, runtime sensors. The shift is earlier:
Tokens exist only after the bag proves it contains nothing except what policy allows.
Why This Is Obvious (And Superior)
- Prevention beats monitoring. If a tool isn’t approved, it never rides inside a token.
- Deterministic access. Evidence → policy → token → go. No ticket tennis.
- Audit that speaks English. Every token says: “Issued because this bag (hash X) matched that policy (ID Y) at this time.”
Minimal Pattern (Product-Agnostic)
Define the bag
Devcontainer, PodSpec, AMI, or serverless bundle. Pin every artifact by digest.Approve the bag’s contents
Create an explicit allowlist: base image digest, permitted binaries, config hashes, SBOM gates.Attest the bag
Sign a statement: “Only these approved items are present.” Store the proof append-only.Verify at the door
On every access request, recompute reality and prove the environment contains only approved items. No extras.Issue the wristband
Mint short-lived credentials only if the attestation passes. Stampenv_hash,policy_id, and principal.Record the decision
Append-only audit. If you can’t answer why a token existed, it shouldn’t have.
Field Rules (Pin These)
- Minutes, not hours. Long-lived = stolen-lived.
- Only approved tooling. If it’s not on the list, it’s not in the bag.
- No drift. Changing the bag means re-attesting or getting denied.
- Humans ≈ workloads. MFA is a signal, not a hall pass.
- Policy before platform. Declare issuance conditions; automate enforcement.
- Boring by design. Deterministic gates beat heroics and dashboards.
Starter Kit (Mix & Match)
- Attest & Sign: Sigstore (Fulcio, Cosign, Rekor), Witness, in-toto/SLSA, Syft/Grype
- Identity: OIDC for humans/CI; SPIFFE/SPIRE for workloads
- Policy & Gates: OPA/Rego or Cedar; K8s Gatekeeper/Policy Controller
-
Credentials: Cloud STS (minute-scale), session tags/constraints tied to
env_hash&policy_id - Evidence Stores: Rekor; S3 Object Lock / QLDB; optional GUAC to graph artifacts ↔ attestations ↔ deployments
The pattern is the product. Tools are replaceable; the gate is not.
The Line to Use in Every Review
“Once prod creds are issued to an environment, that environment is prod.”
So check the bag—and prove it only contains what policy allows—before issuing the wristband.
Call to (Obvious) Action
- Replace one
:latestwith a pinned, approved base image and sign it. - Add an allowlist of permitted tooling to one environment and enforce it at issuance.
- Log issuance decisions to an append-only store and start every post-mortem with why this token existed.
If your security only checks IDs, you’re letting backpacks full of trouble stroll past the rope.
Check the bag. Prove it only holds policy-approved tooling. Then, and only then, hand out the wristband.

Top comments (0)