KoalaLab Container Hardening Guide

See how koala hardens & provide enterprise-ready base container images

Hardened Base Image

  • No package manager footprint in container image

  • No shell - eliminates entire classes of attacks

User & Permissions

  • Non-root user as default

  • Root login disabled in production images

Package Essentials

  • No VM-era baggage in containers

  • Minimal dependencies - No systemd, debconf, or other unnecessary components

Multi-stage builds

  • Separate builder and production base images using multi-stage builds to produce minimal images

Secure Software supply chain

Reproducibility & Trust: Image Signing & Verification

  • Provenance attestation for the entire supply chain ensuring transparency of the source used to build packages and images

  • Images signed with Cosign and can be verified against our GitHub identity

Build-time SBOM

  • Koala has precise control over the SBOM of the containers & hence can provide build-time SBOMs which are more precise & accurate.

Vulnerability Management

  • Daily image scanning to identify vulnerabilities

  • Daily image builds to keep dependencies up to date

Enterprise SLA

  • 7-day SLA for patching Critical and High vulnerabilities

  • 14-day SLA for patching Medium and Low vulnerabilities

Bespoke usecases/Customize your image

  • Koala’s tight control over the SBOM of the containers & custom minimal package registry allows us to provide customized images for any bespoke usecases.