<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Keeping Containers Up to Date on</title><link>https://deploy-preview-3175--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/updating-images/</link><description>Recent content in Keeping Containers Up to Date on</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><lastBuildDate>Thu, 19 Dec 2024 08:49:15 +0000</lastBuildDate><atom:link href="https://deploy-preview-3175--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/updating-images/index.xml" rel="self" type="application/rss+xml"/><item><title>Considerations for Keeping Containers Up to Date</title><link>https://deploy-preview-3175--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/updating-images/considerations-for-image-updates/</link><pubDate>Thu, 05 Oct 2023 11:07:52 +0200</pubDate><guid>https://deploy-preview-3175--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/updating-images/considerations-for-image-updates/</guid><description>Chainguard rebuilds container images daily to ensure the latest security patches are always included, addressing a critical challenge in container security. While keeping images up-to-date is essential for receiving security updates and new features, updates must be balanced with stability concerns since any code change can potentially introduce breaking changes or impact dependent systems.
Due to the complexity involved in modern containerized applications, there is no one-size-fits-all approach to keeping your container images up to date.</description></item><item><title>How End-of-Life Software Accumulates Vulnerabilities</title><link>https://deploy-preview-3175--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/updating-images/how-eol-software-accumulates-cves/</link><pubDate>Wed, 04 Dec 2024 11:07:52 +0200</pubDate><guid>https://deploy-preview-3175--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/updating-images/how-eol-software-accumulates-cves/</guid><description>Typically, specific versions of software receive updates on a schedule for a set amount of time. Eventually, though, every version of software will stop receiving support. When project maintainers stop providing updates, it&amp;rsquo;s known as the End-of-Life (EOL) stage.
Because it&amp;rsquo;s no longer being actively maintained, software begins to collect vulnerabilities when it reaches EOL. This problem can become compounded when using container images, as they often come with extra components from underlying base images which are all prone to accruing vulnerabilities.</description></item><item><title>Strategies and Tooling for Updating Containers</title><link>https://deploy-preview-3175--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/updating-images/strategies-tools-updating-images/</link><pubDate>Mon, 02 Dec 2024 11:07:52 +0200</pubDate><guid>https://deploy-preview-3175--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/updating-images/strategies-tools-updating-images/</guid><description>When it comes to keeping a system secure, one of the most important measures you can take is to regularly apply updates. In modern, containerized infrastructures, this normally means updating containers to use only the latest container images that are still maintained. A casual observer might expect such a standard and important task to have agreed-on best practices and standardized tooling, but they might be surprised by the wide variety of different solutions and opinions on this problem.</description></item><item><title>Using Renovate with Chainguard Containers</title><link>https://deploy-preview-3175--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/updating-images/renovate/</link><pubDate>Tue, 05 Sep 2023 11:07:52 +0200</pubDate><guid>https://deploy-preview-3175--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/updating-images/renovate/</guid><description>Renovate can be used to alert on updates to Chainguard Containers. This can be an effective way to keep your images up-to-date and free of CVEs. This article explains how to configure Renovate to support Chainguard Containers.
NOTE: This article describes using Renovate to alert on new versions of Chainguard Containers. It is not about alerts for Wolfi packages (which is unsupported at the time of writing).
Prerequisites This guide assumes you have successfully installed and configured Renovate.</description></item><item><title>Keep your Chainguard Containers Up to Date with digestabot</title><link>https://deploy-preview-3175--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/updating-images/digestabot/</link><pubDate>Wed, 07 Feb 2024 15:21:01 +0000</pubDate><guid>https://deploy-preview-3175--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/updating-images/digestabot/</guid><description>Tools used in this video digestabot Transcript Today, I&amp;rsquo;d like to talk about a common question I get asked.
How can you keep images up to date while avoiding breaking changes?
The basic issue is that we&amp;rsquo;d like to make sure we&amp;rsquo;re getting the latest security updates and features for our software.
But we really don&amp;rsquo;t want our applications and infrastructure to break unexpectedly.
So there&amp;rsquo;s a tension between updating all the time, which gives you the latest code and limits unexpected breakages.</description></item></channel></rss>