Conceptual
Verified Organizations
An overview of how to verify your organization and the implications
False Positives and False Negatives with Images Scanners
An overview of the formation of false positive and false negative vulnerability results in container image scanners
The Differences between SBOMs and Attestations
An overview of the differences between attestations and SBOMs
Strategies and Tooling for Updating Container Images
A conceptual article outlining different strategies and tools for keeping images up to date and avoiding the use of end-of-life software.
How End-of-Life Software Accumulates Vulnerabilities
A conceptual article outlining the risk involved with using EOL software and how EOL images accrue vulnerabilities.
Chainguard FIPS Images
A conceptual overview of Chainguard FIPS Images.
STIGs for Chainguard Images
A conceptual overview of Security Technical Implementation Guides, which are available for Chainguard Images.