Hardened Guides
Hardening Best Practices

Hardening Best Practices

Follow these steps to ensure your containerized applications are as secure as possible.

Use Curated Base Images

Avoid standard library images like python, node, or ubuntu. Use securescale images or distroless bases to minimize the attack surface.

Run as Non-Root

Never run your application as root. All SecureScale images come with a nonroot user.

The nonroot user in Wolfi-based images typically has UID 65532.

Multi-Stage Builds

Build your application in one stage and copy ONLY the necessary binaries to the final stage.

Read-Only Filesystem

Run your containers with --read-only to prevent attackers from writing to the disk.

CVE Checklist

ActionToolBenefit
Scan DailyTrivy / GrypeIdentify new vulnerabilities early.
Monitor SBOMsSyftTrack all dependencies (even transitive).
Sign ImagesCosignVerify the image hasn't been tampered with.

[!WARNING] While curated images reduce risk, the code YOU write is still your responsibility. Always perform static analysis (SAST) on your own code.