I'm working in a regulated industry where we need to ensure that our container images are approved, scanned, and free from vulnerabilities before deployment. Currently, we're relying on spreadsheets and manual sign-offs, which I find to be slow and prone to errors. I'm curious how others are handling compliance automation throughout the container lifecycle. Any tips or best practices?
6 Answers
Yeah, manual compliance is a nightmare! We’ve shifted our goal from aiming for zero vulnerabilities to having a 'known good state with signed provenance.' We use lightweight images that come with timestamped tags and signed SBOMs, which has really helped reduce the hassle of manual tracking. Plus, they’re STIG and FedRAMP ready so they fit right into our setup.
For scanning images, I'm a fan of using Trivy. I integrate it into my CI jobs when building images, and we also use Harbor for periodic scans. Harbor can block image pulls if any CVEs exceed a certain threshold, which keeps things secure. Plus, it can generate SBOMs automatically, although managing all that info can be a challenge.
Automating the audit trail within your CI/CD pipeline should definitely be a priority. Using curated images and ongoing vulnerability scans can help. There are services out there that can automate SBOMs and even handle some CVE fixes before deployment. Let me know if you're interested, and I can share some platform recommendations!
One effective way to start is by using trusted base images that are essentially vulnerability-free from the get-go. In addition to that, consider images that offer compliance features like FIPS and STIG. This can really streamline your process right from the start.
I suggest following a process of scanning, attesting, creating a Software Bill of Materials (SBOM), and signing off on deployments. Just a heads-up, achieving completely vulnerability-free images might be unrealistic depending on your app stack. The real goal should be implementing scans and maintaining signed attestations. This keeps the focus on traceability and managing known risks rather than striving for perfection.
A whitelist approach could work, too, but only if you can justify the exceptions you make.

Totally agree! Having zero CVEs isn’t realistic with today’s tech stacks, so it’s smart to focus on documenting the risks you know and the controls you have in place.