Understanding Chainguard's Container Image Categories

Reference guide outlining how Chainguard Images are categorized.

Chainguard Container Images are a collection of curated, distroless container images designed with a focus on software supply chain security. Chainguard’s container images are designed to be slim runtimes for production environments, emphasizing security and efficiency by removing unnecessary elements. Additionally, the images are designed to be easily integrated into existing workflows, helping organizations to build better, more secure software.

Within the Chainguard Images Directory, Chainguard’s images are organized into five general categories (with some images falling into multiple categories):

  • Starter
  • Base
  • Application
  • FIPS
  • AI

This conceptual article will outline each of these categories in turn, including their uses as well as examples of images from each category. It will also highlight important considerations one should make when using images from these categories.

Starter Images

Chainguard offers a set of images that are publicly available and don’t require authentication for download and use; they are free to use for everyone. We refer to these images as our Starter Images, and they cover several use cases for different language ecosystems. Starter images are limited to the latest build of a given image, and are always tagged as latest and latest-dev.

The rest of Chainguard’s Images, those that are not Starter images and not included in the free tier of images, are referred to as Production Images. Production images are enterprise-ready images that come with patch SLAs and features such as Federal Information Processing Standard (FIPS) readiness and unique time-stamped tags. Unlike Starter images, which are typically paired with only the latest version of an upstream package, Production images offer specific major and minor versions of open source software.

You can access Starter images directly from the Chainguard Registry from the chainguard repository. For example, to download the cURL Starter image, you could run a command like the following:

docker pull cgr.dev/chainguard/curl

To access any other image, you will need to do so through your organization’s private Chainguard repository. The following example will pull the chainguard-base image from the chainguard.edu organization’s repository:

docker pull cgr.dev/chainguard.edu/chainguard-base

Note that you won’t have access to the organization’s repository used in this example, but if your organization has access to the chainguard-base image you will be able to pull this image using your organization’s repository name in place of chainguard.edu. The Chainguard Registry provides public access to all Starter images, and provides customer access for Production images after logging in and authenticating.

For a complete list of Starter images that are currently available, check out the Starter category on Chainguard’s Images Directory. Registered users can also access all Starter and available Production images in the Chainguard Console. After logging in you will be able to find all the currently available Starter Images in the Public images tab. If you’ve selected an appropriate organization in the drop-down menu above the left-hand navigation, you can find your organization’s Production Images in the Organization images tab.

Base Images

Base images are meant to be extended by users with their own packages and applications. Examples include chainguard-base, Go, and Python.

Chainguard is responsible for releasing fully-patched toolchains and Base images, while customers are responsible for patching any applications and dependencies they add to a Chainguard image. It is recommended to use a fully-patched Chainguard toolchain image to build the application, and a fully-patched Chainguard Base image to layer the final application on.

When migrating to a Chainguard Base image you should first check the images’s overview page on the Images Directory for usage details and any compatibility remarks. You should understand the libraries, runtime requirements, and operating system dependencies of the applications you plan to have running on the Base image.

It is a best practice to use the same versions of any languages or applications that will be running on the Chainguard Base image as what is currently running in your environment. Do not upgrade language or application versions at the same time that you migrate. Following the migration, you should thoroughly test and monitor your application.

If you need a package to use with your Chainguard Base image, Wolfi packages are available using apk. Ensure you only use Wolfi packages, as Alpine APK’s are not compatible with Wolfi. Additionally, it is important to note that vendor-provided packages need to be glibc-based and their functionality should be fully tested along with the application. For additional tips, please refer to our guide on Troubleshooting apko Builds.

Note: Base images often require more customization by the user. Be aware that Chainguard offers a customization platform called Custom Assembly to streamline this requirement without customers having to stand up their own custom pipelines.

Application Images

In contrast with Base images, which are intended to be built upon, Application images are designed to be used directly, often by plugging into systems like Helm. Some examples of Chainguard’s Application images include nginx, Fulcio, and apko.

When it comes to maintaining Application images, Chainguard is responsible for rebuilding the upstream project with the latest toolchain and patching static and dynamic dependencies where such a change is non-breaking. Customers are responsible for tracking a supported version of the Chainguard image.

When migrating to a Chainguard Application image you should first check the image’s overview page on the Images Directory for usage details and any compatibility remarks. There may be user ID, permissions, or volume path differences with the Chainguard image that you should be aware of. It is a best practice to use the same version of the Chainguard Application image as what is currently running in your environment.

AI Images

Artificial intelligence and machine learning (AI/ML) systems are used in a wide variety of high-stakes applications, including information retrieval, medical research, fraud identification, military operations, autonomous vehicle navigation, and more. If compromised by malicious actors, the consequences could be disastrous and far reaching.

Due to their unique features and uses, these systems often pose a greater risk than traditional software systems. Chainguard offers a suite of CPU- and GPU-enabled AI container images which can help to mitigate these risks. Some of these AI images include NeMo, PyTorch, and TensorFlow.

These images are hardened, minimal, and optimized for efficient AI development and deployment. By leveraging Chainguard AI Images, organizations can confidently secure their AI infrastructure, streamline vulnerability management, and maintain high performance with low-to-zero vulnerabilities. Rather than starting with tens, dozens, or hundreds of CVEs in your application or pipeline, you start with a clean slate.

To learn more about Chainguard’s AI images and their uses, we encourage you to check out our course on Securing the AI/ML Supply Chain.

FIPS images

FIPS — or, Federal Information Processing Standards — are publicly announced standards developed by the National Institute of Standards and Technology (NIST). Chainguard offers images that use FIPS-validated cryptographic software modules to help users ensure that their applications meet FIPS standards.

Chainguard offers FIPS versions of many of its container images, so FIPS images will fall into more than one category. Some Chainguard images with FIPS variants are nginx, PHP, and PyTorch.

For more information, please refer to our conceptual article on Chainguard FIPS Images.

Image Type Considerations

There is some overlap between the different image categories outlined in this guide. For example, the PyTorch image is an AI image, but it is also part of our free tier, meaning it’s also a Starter image.

Many customers purchase both Application and Base images. Note that it often takes more time to migrate your applications to a Base image in comparison to an Application image due to the complexity of coordinating multiple teams, testing, and release schedules. We recommend starting with and migrating to Application images first while your teams get trained and onboarded with Base images.

A common requirement for many customers is to add a company-specific certificate or other security related content. The three most common ways to accomplish this are:

  1. Using incert
  2. Running the update-ca-certificates utility within a Dockerfile
  3. Using the Java keytool utility within a Dockerfile

The process of adding or updating certificates, configuring APK repositories, and implementing other organization-specific customizations into an image is commonly known as creating a “Golden Image”. This approach enables these standard modifications to be applied once and then distributed across all teams, thereby reducing the risk of errors and minimizing friction during the migration process.

Learn More

By reading this guide, you should have a better understanding of how Chainguard categorizes its container images and what these categories mean. To recap:

  • Starter: Chainguard’s free tier of Images
  • Base: Images meant to be built upon
  • Application: Images meant to be run directly
  • FIPS: Contain FIPS-validated cryptographic modules
  • AI: Images for running AI/ML workloads securely

For more information on Chainguard Images, please refer to the other resources in the About section. In particular, you may find our conceptual article on Chainguard’s Shared Responsibility Model to be of interest.

Last updated: 2025-04-03 11:07