top | item 39704137

(no title)

dlor | 1 year ago

I work at Chainguard, happy to answer any questions!

discuss

order

remram|1 year ago

I read the blog, then I clicked on the big "back" button at the top labeled "Unchained" and read that, then I went to your homepage and read that, then I clicked "get started" and read that page too.

I still have no idea what Chainguard is, or what those images do. All I know is those images are "hardened", is that the only thing they're for? Is that Chainguard's product?

amouat|1 year ago

I work at Chainguard.

In a nutshell we produce minimal container images with a low CVE count. In many cases they should be drop in replacements for the containers you are currently using.

This is particularly useful if your team uses a scanner like trivy/snyk/grype/Docker Scout and spends time investigating CVEs. Less CVES == less time investigating. It can also be critical in regulated environments.

jacques_chester|1 year ago

Not at Chainguard but I've watched their growth.

I think this comes down to audience. To a lot of engineers it's just like ... "OK, that's nice. What else?"

But for security teams in large enterprises, Chainguard is like manna from heaven. They immediately understand what is really being sold: the elimination of enormous amounts of compulsory toil due to upgrading vulnerable software -- or having to nag other teams to do it.

It's a bit like visiting the site of a medical devices manufacturer. I probably don't know what the device does, but the target audience sure do.

astockwell|1 year ago

Many organizations pay people (or entire teams) to maintain a suite of hardened images, either for device/firmware applications, or because they use many languages in-house, etc. This is definitely one of those business models I thought "oh, of course" as soon as I saw it.

dlor|1 year ago

Yep, that's it - the product is hardened container images!

Operyl|1 year ago

EDIT: upon using dockerhub’s organization page for a bit, and realizing there’s no search on the organization page (I swear there was?), I now understand.

Why does the article present this bizarre set of instructions for grabbing the image instead of linking directly? You could just link your organization no?

> Getting started with Chainguard Developer Images in Docker Hub is easy. Follow these simple steps:

> Look up the Image you want.

> Select ‘Recently Updated’ from the dropdown menu on the right.

> Filter out the community images by selecting the filter ‘Verified Publisher.’

> Copy the pull command, paste it into your terminal, and you are all set.

dlor|1 year ago

Good callout, if you know how to use docker and and dockerhub then it's just as easy as `docker pull chainguard/node`

jamesdwilson|1 year ago

If a primary goal of a consumer of the images is security, how can we trust the images not to have backdoors or virusesesses [extra s added for comedy]?

dlor|1 year ago

Great question! We take hardening of our build infrastructure very seriously, and helped build many of the OSS technologies in this space like the SLSA framework and the Sigstore project.

We produce SBOMs during the build process, and cryptographically sign SLSA-formatted provenance artifacts depicting the entire build process so you can trace a built container all the way back to the sources it was built from.

We also try to make as much of our build system reproducible as possible (but we're not all the way there yet), so you can audit or rebuild the process yourself.