FedRAMP Technical Considerations & Risk Factors
A conceptual overview of Chainguard FIPS Containers.
Product Docs
Open Source
Compliance
Education
Federal Information Processing Standards (FIPS) are standards developed by the National Institute of Standards and Technology (NIST) in accordance with the Federal Information Security Management Act (FISMA). FIPS compliance ensures that cryptographic security services within applications meet strict security and integrity standards, and are implemented and configured correctly.
Chainguard provides FIPS-validated container images to help organizations meet federal compliance requirements, including FedRAMP and Department of Defense security frameworks. These FIPS-enabled containers feature a kernel-independent design that simplifies deployment while maintaining compliance.
Chainguard offers 400+ FIPS image variants covering language runtimes (Go, Java, Python, Node.js, .NET, PHP, C/C++), databases, web servers, and Kubernetes components. These images use NIST-validated cryptographic modules including the OpenSSL FIPS provider (CMVP Certificate #4282) and Bouncy Castle FIPS for Java.
All FIPS images include STIG hardening, daily builds with zero-to-minimal CVEs under SLA, and build-time SBOMs. Chainguard’s warranties and certification details are on the FIPS Commitment page.
Traditionally, FIPS-compliant containers required the host kernel to be configured in FIPS mode to provide a validated entropy source. This limited deployment options and prevented testing on developer machines.
Chainguard FIPS Containers use a userspace entropy source (the Jitterentropy library with SP 800-90B validation) instead of relying on the kernel. This allows FIPS containers to run on any recent Linux kernel, including developer workstations, standard CI/CD environments, and cloud platforms like GKE, AWS Bottlerocket, and Azure Linux.
Limitations: Some workloads (certain Kubernetes CNI plugins, LUKS2 encryption, StrongSwan VPN) still require a kernel configured in FIPS mode. As of August 2025, Java-based FIPS images support kernel-independent operation.
For technical details, see Kernel-Independent FIPS Containers.
FIPS images are available for language runtimes (Go, Java, Node.js, Python, .NET, PHP), databases (PostgreSQL, Elasticsearch, Redis), web servers (nginx, HAProxy), Kubernetes components, and monitoring tools. View the complete catalog at images.chainguard.dev/?category=fips.
All Chainguard FIPS Containers include STIG hardening in addition to FIPS validation. For images not currently available with FIPS, contact Chainguard to discuss custom requirements.
Chainguard FIPS Containers are not included in the free tier. To request access, contact Chainguard.
A conceptual overview of Chainguard FIPS Containers.
Frequently Asked Questions about Chainguard FIPS Container Images
Getting started with the CVE Visualization feature.
A conceptual article outlining the risk involved with using EOL software and how EOL images accrue vulnerabilities.
A conceptual article outlining different strategies and tools for keeping images up to date and avoiding the use of …
Last updated: 2025-07-23 15:09