<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Chainguard Containers Features on</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/</link><description>Recent content in Chainguard Containers Features on</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><lastBuildDate>Thu, 19 Dec 2024 08:49:15 +0000</lastBuildDate><atom:link href="https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/index.xml" rel="self" type="application/rss+xml"/><item><title>Chainguard End-of-Life Grace Period for Containers</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/eol-gp-overview/</link><pubDate>Wed, 14 May 2025 08:49:31 +0000</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/eol-gp-overview/</guid><description>Typically, specific versions of software receive updates on a schedule for a set amount of time. Eventually, though, every version of software will stop receiving support. When project maintainers stop providing updates, it&amp;rsquo;s known as the End-of-Life (EOL) stage.
It&amp;rsquo;s recommended that when a software version reaches the EOL phase, users should migrate their projects to a later version, as EOL software is known to accumulate vulnerabilities. However, there are cases where an organization may want to continue using a container image after it has reached end-of-life.</description></item><item><title>STIGs for Chainguard Containers</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/image-stigs/</link><pubDate>Thu, 13 Jun 2024 15:56:52 -0700</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/image-stigs/</guid><description>The practice of using Security Technical Implementation Guides, or &amp;ldquo;STIGs,&amp;rdquo; to secure various technologies originated with the United States Department of Defense (DoD). If an organization uses a certain kind of software, say MySQL 8.0, they must ensure that their implementation of it meets the requirements of the associated Security Requirements Guides (SRG) in order to qualify as a vendor for the DoD. More recently, other compliance frameworks have begun acknowledging the value of STIGS, with some going so far as to require the use of STIGs in their guidelines.</description></item><item><title>Requesting New Chainguard Resources</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/request-resources/</link><pubDate>Thu, 26 Feb 2026 11:07:52 +0200</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/request-resources/</guid><description>The Chainguard Console includes the Requests section where customers can submit and track requests for resources that Chainguard doesn&amp;rsquo;t currently offer. This improves transparency around which technologies Chainguard is working to build and helps minimize duplicate build requests.
This guide provides an overview of how to submit a request for a new resource to Chainguard, as well as the limitations on what resources can be built.
Note: As of this writing, the Requests section is in beta.</description></item><item><title>Using the Tag History API</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/using-the-tag-history-api/</link><pubDate>Fri, 26 May 2023 08:49:31 +0000</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/using-the-tag-history-api/</guid><description>Chainguard Containers have automated nightly builds, which ensures our container images are always fresh including any recent patches and updated software. Even though it is important to keep your base images always updated, there will be situations where you&amp;rsquo;ll want to keep using an older build to make sure nothing will change in your container environment until you feel it&amp;rsquo;s safe to update.
For cases like this, it is useful to point your Dockerfile to use a specific container image digest as base image.</description></item><item><title>Using CVE Visualizations</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/cve_visualizations/</link><pubDate>Thu, 19 Dec 2024 11:07:52 +0200</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/cve_visualizations/</guid><description>Chainguard provides CVE Visualizations for all of its container images. This feature creates reports with CVE comparisons between Chainguard Containers and popular alternatives, as well as historical CVE remediation metrics. CVE Visualizations provide insight into image health and can help teams measure the engineering, security, and economic benefits gained from using Chainguard Containers.
This guide outlines how you can access a container image&amp;rsquo;s CVE Visualization in both the Chainguard Console and in the Containers Directory.</description></item><item><title>How To Use incert to Create Container Images with Built-in Custom Certificates</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/incert-custom-certs/</link><pubDate>Mon, 03 Jul 2023 11:07:52 +0200</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/incert-custom-certs/</guid><description>NOTE: If you are looking for a way to add certificates to existing Chainguard images, check out our doc on adding custom certificates with Custom Assembly.
In many enterprise settings, an organization will have its own certificate authority which it uses to issue certificates for its internal services. This is often for security or control reasons but could also be related to regulatory requirements.
If you&amp;rsquo;re using a container that needs to communicate with your organization&amp;rsquo;s services and your organization has its own certificate authority, you&amp;rsquo;ll need to add a valid certificate into your container.</description></item><item><title>Unique Tags for Chainguard Containers</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/unique-tags/</link><pubDate>Thu, 29 Feb 2024 08:49:31 +0000</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/features/unique-tags/</guid><description>Chainguard&amp;rsquo;s Unique Tags feature provides unique timestamped tags for every container image build, addressing enterprise requirements for precise version tracking and automated deployment workflows. Many organizations rely on distinct tags to trigger automated deployments and maintain audit trails, making traditional floating tags like &amp;rsquo;latest&amp;rsquo; unsuitable for production use.
To help with cases like this, Chainguard offers Unique Tags for private registries. Unique Tags are ideal for organizations that require a strict tag per release or update of their images.</description></item></channel></rss>