@@ -59,6 +59,13 @@ Build and Deployment:
5959 evidence : " "
6060 comments : " "
6161 Nightly build of images (base images) :
62+ description : |-
63+ A base image is a pre-built image that serves as a starting point for building
64+ new images or containers. These base images usually include an operating system,
65+ necessary dependencies, libraries, and other components that are required to run
66+ a specific application or service. Nightly builds of custom base images refer to
67+ an automated process that occurs daily or on a scheduled basis, usually during
68+ nighttime or off-peak hours, to create updated versions of custom base images.
6269 risk : Vulnerabilities in running containers stay for too long and might get
6370 exploited.
6471 measure : Custom base images are getting build at least nightly. In case the
@@ -82,6 +89,12 @@ Build and Deployment:
8289 evidence : " "
8390 comments : " "
8491 Reduction of the attack surface :
92+ description : |-
93+ Distroless images are minimal, stripped-down base images that contain only the
94+ essential components required to run your application. They do not include package
95+ managers, shells, or any other tools that are commonly found in standard Linux
96+ distributions. Using distroless images can help reduce the attack surface and
97+ overall size of your container images.
8598 risk : Components, dependencies, files or file access rights might have vulnerabilities,
8699 but the they are not needed.
87100 measure : Removal of unneeded components, dependencies, files or file access
@@ -95,6 +108,7 @@ Build and Deployment:
95108 implementation :
96109 - $ref : src/assets/YAML/default/implementations.yaml#/implementations/distroless
97110 - $ref : src/assets/YAML/default/implementations.yaml#/implementations/fedora-coreos
111+ - $ref : src/assets/YAML/default/implementations.yaml#/implementations/distroless-usage
98112 references :
99113 samm2 :
100114 - I-SB-2
@@ -107,6 +121,15 @@ Build and Deployment:
107121 evidence : " "
108122 comments : " "
109123 Usage of a maximum lifetime for images :
124+ description : |-
125+ The maximum lifetime for a Docker container refers to the duration a container
126+ should be allowed to run before it is considered outdated, stale, or insecure.
127+ There is not a fixed, universally applicable maximum lifetime for a Docker
128+ container, as it varies depending on the specific use case, application
129+ requirements, and security needs. As a best practice, it is essential to define
130+ a reasonable maximum lifetime for containers to ensure that you consistently
131+ deploy the most recent, patched, and secure versions of both your custom base
132+ images and third-party images.
110133 risk : Vulnerabilities in images of running containers stay for too long and
111134 might get exploited. Long running containers have potential memory leaks.
112135 A compromised container might get killed by restarting the container (e.g.
@@ -133,6 +156,15 @@ Build and Deployment:
133156 evidence : " "
134157 comments : " "
135158 Usage of a short maximum lifetime for images :
159+ description : |-
160+ The maximum lifetime for a Docker container refers to the duration a container
161+ should be allowed to run before it is considered outdated, stale, or insecure.
162+ There is not a fixed, universally applicable maximum lifetime for a Docker
163+ container, as it varies depending on the specific use case, application
164+ requirements, and security needs. As a best practice, it is essential to define
165+ a reasonable maximum lifetime for containers to ensure that you consistently
166+ deploy the most recent, patched, and secure versions of both your custom base
167+ images and third-party images.
136168 risk : Vulnerabilities in running containers stay for too long and might get
137169 exploited.
138170 measure : |
0 commit comments