CHAINGUARD IMAGES
Network Requirements
Using Chainguard Containers with firewalls, access control lists, and proxies
Chainguard Shared Responsibility ModelReference guide outlining Chainguard's Shared Responsibility model: a framework that clarifies security obligations for hardened container images.
Strategies for Minimizing your CVE RiskA conceptual article outlining best practices for reducing one's CVE risk.
Considerations for Keeping Images Up to DateA conceptual article on best practices for keeping images up to date.
Overview of Assumable Identities in ChainguardAn overview of what assumable identities are and how they can be used with Chainguard assets.
Using Custom Identity Providers to Authenticate to ChainguardAn introduction to and overview of Chainguard's custom IDP support features
Registry OverviewAn Overview of the Chainguard Registry