Chainguard VMs FAQ
Frequently asked questions about Chainguard VMs, including availability, supported ecosystems, compliance, and more
Chainguard VMs provide pre-hardened, audit-ready Linux virtual machine images designed for regulated and high-assurance environments (federal, defense, healthcare, financial services, and suppliers to those sectors). These images combine the following features:
| Feature | Description |
|---|---|
| FIPS 140-3 validated cryptography | NIST CMVP-validated software modules and SP 800-90B compliant entropy, with runtime guardrails blocking non-FIPS crypto. |
| STIG hardening | Pre-configured to DISA STIG controls, delivered as production-ready images. |
| CIS benchmark compliance | CIS Level 1 hardened variants, hybrid STIG + CIS baseline. |
| Secure Boot | Secure Boot enabled by default across AWS, Azure, GCP, and on-prem. |
| Compliance evidence & reporting | FIPS certificates, OpenSSL docs, Security Content Automation Protocol (SCAP) scan results, and POA&M-ready artifacts. |
| CVE remediation SLA | 7 days for critical CVEs, 14 days for high, medium, and low. |
Chainguard FIPS 140-3 validated and hardened VM images serve as ready-to-use replacements for standard operating systems across AWS, Azure, and GCP, allowing organizations to maintain existing infrastructure and workflows while achieving immediate compliance. This guide outlines the compliance features of Chainguard VMs and how they can help reduce engineering toil for your organization.
Chainguard VMs include FIPS 140-3 validated software cryptographic modules, backed by a NIST Cryptographic Module Validation Program (CMVP) certificate.
This setup allows teams to consume an OS image that is already FIPS-conformant at the platform layer rather than building and validating crypto modules in-house.
Chainguard VMs provide variants hardened to DISA Security Technical Implementation Guide (STIG) requirements which are used across U.S. federal and defense environments.
Chainguard can also provide SCAP scan outputs aligned with STIG requirements, helping teams demonstrate compliance with control requirements during audits.
For organizations standardizing on CIS controls, Chainguard offers images hardened to CIS Level 1 benchmarks. Chainguard VMs use a hybrid baseline combining CIS Level 1 benchmarks with STIG requirements and industry-recognized secure defaults to provide defense-in-depth hardening.
This allows security and Governance, Risk, and Compliance teams to map infrastructure posture to both internal CIS-based policies and external STIG-based requirements without maintaining parallel baselines.
All Chainguard VM images support Secure Boot enabled by default across:
Secure Boot ensures only cryptographically signed and trusted components participate in the boot chain, preventing tampering with early-boot components such as the bootloader and kernel.
Chainguard VMs are designed to simplify the generation of compliance artifacts often required in audits, ATO processes, and customer security reviews.
Available artifacts include:
By shipping this evidence with the images, Chainguard significantly shortens the time required to build audit packages and meet regulatory reporting needs.
Chainguard VMs are built and maintained with an explicit CVE remediation SLA:
Chainguard VM images are updated regularly and made available to customers within these SLA windows, leaving them with a minimal, hardened footprint which reduces the volume of installed software and minimizes the attack surface. This leaves customers with a much smaller and more manageable CVE count.
This lifecycle management shifts ongoing compliance from a perpetual engineering project to a managed image-consumption model.
Last updated: 2025-11-20 15:09