Reference

Network Requirements
Using Chainguard Containers with firewalls, access control lists, and proxies
Alpine Compatibility
Differences between Chainguard Containers and Alpine third-party images
Overview of the Chainguard IAM Model
Overview of Chainguard Identity and Access Management
Debian Compatibility
Differences between Chainguard Containers and Debian third-party images
Rego Policies
Writing Rego-based policies for Sigstore Policy Controller
CISA Secure Software Development Attestation Form (Draft)
Ubuntu Compatibility
Differences between Chainguard Containers and Ubuntu third-party images