Listing Thumbnail

    Chainguard Images

     Info
    Sold by: Chainguard 
    Deployed on AWS
    Chainguard Images are a collection of minimal, hardened container images that are patched and rebuilt daily, and come with low-to-zero known CVEs, SLSA 2 compliance, signatures, and SBOMs.
    4.8

    Overview

    Chainguard Images are a collection of minimal, hardened container images. They only contain what is required to build or run your application, delivering on average a 97.6% reduction in CVEs. Each Chainguard Image is patched and rebuilt daily from source with the latest security fixes and CVE remediations, resulting in low-to-zero known CVEs, verifiable image signatures and attestations, high-quality SBOMs, and SLSA Level 2 - Build compliance.
    The Chainguard Images inventory contains images for the most popular base images, including Go, Python, Ruby, PHP, Node, and more; and a selection of common developer tools, applications, data products, and servers.
    Chainguard Production Images are available for FIPS compliance, major and minor versions, enterprise SLAs, and customer support. Chainguard offers custom pricing through AWS Marketplace Private Offers.

    Chainguard provides custom pricing for customers via Private Offer. Please contact AWS-marketplace@chainguard.dev  for more information on our pricing model. Pricing displayed is per Image.

    Highlights

    • Low-to-zero known CVEs with daily patches and rebuilds
    • Full SLSA Build Level 2 provenance, signatures, and SBOMs
    • Images with FIPS validation available upon request

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Chainguard Images

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (6)

     Info
    Dimension
    Description
    Cost/12 months
    Starter Images
    :latest version of OSS packages
    $0.00
    Application Image
    The listed pricing is for illustrative purposes only and does not reflect actual pricing, which will be provided upon request, exclusively as part of a private offer from Chainguard
    $0.01
    Base Image
    The listed pricing is for illustrative purposes only and does not reflect actual pricing, which will be provided upon request, exclusively as part of a private offer from Chainguard
    $0.01
    FIPS Image
    The listed pricing is for illustrative purposes only and does not reflect actual pricing, which will be provided upon request, exclusively as part of a private offer from Chainguard
    $0.01
    AI Image
    The listed pricing is for illustrative purposes only and does not reflect actual pricing, which will be provided upon request, exclusively as part of a private offer from Chainguard
    $0.01
    Standard CSM
    The listed pricing is for illustrative purposes only and does not reflect actual pricing, which will be provided upon request, exclusively as part of a private offer from Chainguard
    $0.01

    Vendor refund policy

    Contact us for refund information

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Application Stacks, Operating Systems
    Top
    100
    In Collaboration & Productivity, Application Development
    Top
    25
    In Compliance and Auditing

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Daily Security Patching and Rebuilding
    Container images are patched and rebuilt daily from source with the latest security fixes and CVE remediations.
    Vulnerability Reduction
    Minimal, hardened container images delivering on average a 97.6% reduction in CVEs with low-to-zero known vulnerabilities.
    Supply Chain Security Compliance
    Full SLSA Level 2 - Build compliance with verifiable image signatures, attestations, and high-quality SBOMs.
    Multi-Language Runtime Support
    Pre-built images available for popular programming languages and runtimes including Go, Python, Ruby, PHP, and Node.
    FIPS Compliance Availability
    Production images with FIPS validation available for regulatory compliance requirements.
    Automated Vulnerability Remediation
    Automatically removes up to 95% of CVEs without requiring code changes, reducing vulnerability and patch management backlogs.
    Daily Security Patching and Hardening
    Curated images are patched and hardened daily from source with latest security fixes and CVE remediations, resulting in Zero or Near-Zero CVEs.
    Software Bill of Materials Generation
    Generates high-quality SBOMs in multiple formats including raw JSON, SPDX, and Cyclone DX to address software supply chain and compliance requirements.
    CI/CD Pipeline Integration
    Integrates with CI/CD pipelines and container deployment platforms through simple API calls.
    Build Compliance Certification
    Achieves SLSA Level 2 Build compliance for container images and applications.
    Security Hardening Standard
    Hardened according to CIS Benchmark Level 2 profile developed through consensus-based process and accepted by government, business, industry, and academia.
    Regulatory Compliance Support
    Supports compliance with PCI DSS, FedRAMP, DoD Cloud Computing SRG, FISMA, and select NIST publications.
    Container Orchestration Optimization
    Optimized for use with Amazon Elastic Container Service for Kubernetes (EKS) on Amazon Linux 2 base image.
    Security Configuration Components
    Includes hardened account and local policies, firewall configuration, and computer-based and user-based administrative templates.
    Conformance Assessment and Documentation
    Includes CIS Configuration Assessment Tool (CIS-CAT Pro) reports and detailed documentation of hardening changes, package modifications, and exceptions applied to the image.

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.8
    51 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    88%
    10%
    2%
    0%
    0%
    1 AWS reviews
    |
    50 external reviews
    External reviews are from G2 .
    Moshika S.

    Great Product Innovation Backed by Outstanding Customer Service

    Reviewed on Mar 17, 2026
    Review provided by G2
    What do you like best about the product?
    Great Customer service, our account manager is so on top of things! Great product and continued innovation
    What do you dislike about the product?
    .Net availability for Chainguard libraries isn’t available yet and not sure if it’s on the roadmap.
    What problems is the product solving and how is that benefiting you?
    Low resource needs for CVE resolution
    Financial Services

    Seamless CI/CD Integration and Transparent SBOMs with Chainguard Libraries

    Reviewed on Mar 17, 2026
    Review provided by G2
    What do you like best about the product?
    The seamless integration with our existing CI/CD pipeline, along with Chainguard’s transparency through SBOM and the overall Chainguard Libraries experience.
    What do you dislike about the product?
    I antipate Chainguard's capability to audit which JS Libraries appear from Chainguard vs NPM even after they're drawn through JFrog/Arctifactory.
    What problems is the product solving and how is that benefiting you?
    Transparency and risk mitigation.
    Accounting

    Strong Security and a Great Experience So Far

    Reviewed on Mar 17, 2026
    Review provided by G2
    What do you like best about the product?
    Chainguard is getting a lot of attention because it solves a very real (and growing) problem: software supply chain security—basically making sure the code and containers you run aren’t quietly compromised.
    What do you dislike about the product?
    Nothing yet it can be expensive. Learn g curve
    What problems is the product solving and how is that benefiting you?
    Chainguard is getting a lot of attention because it solves a very real (and growing) problem: software supply chain security—basically making sure the code and containers you run aren’t quietly compromised.
    Security and Investigations

    Great Catalog of FIPS-Compliant Images with Easy Base Image Customization

    Reviewed on Jan 21, 2026
    Review provided by G2
    What do you like best about the product?
    There is a good catalog of fips compliant images, and they support customization by adding packages directly to a base image.
    What do you dislike about the product?
    Some image were missing which complicated the process of migrating all our services.
    What problems is the product solving and how is that benefiting you?
    It is helping us achieve fedramp high which expands our client base.
    Daniel R.

    Secure, Low-Vulnerability Containers That Integrate Seamlessly into Our Pipelines

    Reviewed on Jan 19, 2026
    Review provided by G2
    What do you like best about the product?
    Chainguard zero- and minimum-vulnerability containers help us deliver secure services and products to our customers with less effort and reduced cybersecurity risk. These containers are a 1-to-1 replacement for existing publicly available containers, and they integrate easily into our development pipelines with no additional effort.
    What do you dislike about the product?
    Chainguard containers are expensive. However, when I consider how many staff hours go into building and maintaining hardened, low-vulnerability containers for applications, the cost does pay off.
    What problems is the product solving and how is that benefiting you?
    Chainguard helps reduce cybersecurity risks and the effort associated with our applications by providing secure open-source containers. This, in turn, lowers our need to build and maintain low-vulnerability forks of open-source packages.
    View all reviews