<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>About Chainguard Containers on</title><link>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/</link><description>Recent content in About Chainguard Containers on</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><lastBuildDate>Thu, 19 Dec 2024 08:49:15 +0000</lastBuildDate><atom:link href="https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/index.xml" rel="self" type="application/rss+xml"/><item><title>Chainguard Criteria for Determining Whether to Build a Container Image</title><link>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/what-chainguard-will-build/</link><pubDate>Mon, 13 Jan 2025 11:07:52 +0200</pubDate><guid>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/what-chainguard-will-build/</guid><description>There are currently over 2,000 Chainguard Containers and that number is always growing as we add more to our expanding catalog.
If you would like a Chainguard Container that is not yet available, or inquire about whether we would build a given container image, Chainguard will endeavor to perform an analysis on the request. Chainguard aims to build new container images that are relevant to our customers and to support broader software security goals.</description></item><item><title>Chainguard Shared Responsibility Model</title><link>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/shared-responsibility-model/</link><pubDate>Thu, 17 Oct 2024 11:07:52 +0200</pubDate><guid>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/shared-responsibility-model/</guid><description>Chainguard’s mission is to be the safe source for open source. As part of this mission, Chainguard builds all of our packages and images from upstream open source code and delivers the resulting artifacts to our customers. There are three distinct parties involved here: Upstream projects, Chainguard, and Customers; each of these parties share some measure of responsibility across a few dimensions.
This guide is an overview of Chainguard&amp;rsquo;s Shared Responsibility Model: a framework that outlines the security responsibilities of upstream open source software projects, Chainguard, and its customers.</description></item><item><title>Getting Started with Distroless Container Images</title><link>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/getting-started-distroless/</link><pubDate>Thu, 21 Mar 2024 08:49:31 +0000</pubDate><guid>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/getting-started-distroless/</guid><description>About Distroless Container Images Distroless container images, like the ones built by Chainguard, are a type of container image designed to include only essential software required to run an application or service. Unlike traditional images based on Debian or Ubuntu — which include package managers, utilities, and shells — Chainguard&amp;rsquo;s distroless images remove these components to significantly reduce attack surface and minimize vulnerabilities.
This minimal approach offers several benefits, including:</description></item><item><title>How Chainguard Containers are Tested</title><link>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/images-testing/</link><pubDate>Thu, 21 Mar 2024 11:07:52 +0200</pubDate><guid>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/images-testing/</guid><description>Chainguard Containers are minimal, distroless container images that you can use to build and run secure applications. Given the importance of secure, highly performant images, Chainguard performs testing to ensure our container images match the functionality of upstream and other external counterparts.
This article provides a high-level overview of Chainguard&amp;rsquo;s approach to testing when building new container images to ensure their security and consistency with comparable container images.
Build requirements for new container images Chainguard has a set of requirements in place that new container images must meet in order to be included in our Containers Directory.</description></item><item><title>Chainguard's Container Variants</title><link>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/differences-development-production/</link><pubDate>Fri, 01 Nov 2024 07:52:00 +0200</pubDate><guid>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/differences-development-production/</guid><description>Chainguard Containers follow a distroless philosophy, meaning that only software absolutely necessary for a specific workload is included in an image. Designed to be as minimal as possible, Chainguard&amp;rsquo;s standard container images do not contain package managers such as apk, shells such as b/a/sh, or development utilities such as Git or text editors. However, this distroless approach isn&amp;rsquo;t suitable for every use case. For this reason, most Chainguard Containers have what&amp;rsquo;s called a development variant.</description></item><item><title>Chainguard Containers Product Release Lifecycle</title><link>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/versions/</link><pubDate>Mon, 08 Jan 2024 08:49:31 +0000</pubDate><guid>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/versions/</guid><description>Chainguard Containers are able to offer few-to-zero known vulnerabilities because they are updated frequently. Because of this continuous release cycle, the best way to mitigate vulnerabilities is to use the newest build of each Chainguard Container available. Chainguard keeps Containers up to date by doing one or more of the following:
Applying new releases from upstream projects Rapidly applying upstream patches to current releases — you can read more about this in our blog post, “How Chainguard fixes vulnerabilities before they&amp;rsquo;re detected” Applying Chainguard patches to OSS software Upstream projects are updated frequently for many reasons, including to combat CVEs, and Chainguard ensures that the most up-to-date software is available in all Chainguard Containers.</description></item><item><title>Understanding Chainguard's Container Image Categories</title><link>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/images-categories/</link><pubDate>Thu, 03 Apr 2025 11:07:52 +0200</pubDate><guid>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/images-categories/</guid><description>Chainguard Containers are a collection of curated, distroless container images designed with a focus on software supply chain security. Chainguard&amp;rsquo;s container images are designed to be slim runtimes for production environments, emphasizing security and efficiency by removing unnecessary elements. Additionally, the images are designed to be easily integrated into existing workflows, helping organizations to build better, more secure software.
Within the Chainguard Containers Directory, Chainguard Containers are organized into five general categories (with some falling into multiple categories):</description></item><item><title>How Chainguard Creates Container Images with Low-to-No CVEs</title><link>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/zerocve/</link><pubDate>Fri, 31 May 2024 12:21:01 +0000</pubDate><guid>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/zerocve/</guid><description>Tools and resources used in this video Grype Wolfi Security Advisories Note: In November 2024, after this article was first written, Chainguard made changes to its free tier of container images. In order to access the non-free container images used in this guide, you will need to be part of an organization that has access to them. For a full list of container images that will remain in Chainguard's free tier, please refer to this support page.</description></item><item><title>Package and Image Name Mappings</title><link>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/package-name-mappings/</link><pubDate>Thu, 23 Oct 2025 11:07:52 +0200</pubDate><guid>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/package-name-mappings/</guid><description>When migrating to Chainguard Containers, you may notice that some package and image names differ from their upstream counterparts. This guide explains why these mappings exist and provides a comprehensive reference of how Chainguard maps image and package names to our container ecosystem.
Why Chainguard Remaps Package Names Different Linux distributions often use different names for the same software. For example, Debian calls its C compiler package build-essential, while Alpine calls the equivalent package build-base and Fedora uses gcc and related packages.</description></item><item><title>Can anybody build Chainguard Containers themselves?</title><link>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/can-anybody-build-containers/</link><pubDate>Sat, 02 Aug 2025 16:00:00 +0000</pubDate><guid>https://deploy-preview-3174--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/about/can-anybody-build-containers/</guid><description>Transcript Interviewer: But everything is open source—can anybody build the images themselves?
Dustin Kirkland: Anyone certainly can. It does take quite a bit of expertise to get that to build the first time, and we&amp;rsquo;ve structured an entire engineering organization around building things the first time.
When we get new requests from either internal Chainguard or our existing customers or our new prospects, it goes through a process by which we analyze that source code.</description></item></channel></rss>