Monday, April 27, 2026
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security
Containers Features Kubernetes Social - Facebook Social - LinkedIn Social - X Topics 

BellSoft’s 3-in-1 Strategy for Container Security

November 11, 2025 Jeff Burt 3-in-1 approach, AI threats, Chainguard, cloud native security, cloud security, container hardening, container incidents, container security, container vulnerabilities, containerized applications, CVE remediation, distroless containers, hardened containers, Hardened Images, Java runtime optimization, kubernetes, lightweight Linux, regulatory compliance, runtime security, secure container images, secure DevOps, software supply chain, Vulnerability Management
by Jeff Burt

Containers have made life a lot easier for programmers, making application development portable and solving what cybersecurity firm SentinelOne calls the “it only works in my machine” problem. Given that, it’s not surprising that container adoption among developers continues to grow rapidly. 

But with that popularity comes attention from threat actors looking to exploit container use and the inherent weaknesses in them. NetRise found that two-thirds of organizations in 2024 experienced a container-related security incident, while a Red Hat study said a typical container image carries more than 600 known vulnerabilities, almost half of which are years old.  

Techstrong Gang Youtube

In addition, Datadog researchers found that 44% of Java services contain security flaws that have been exploited. 

“The adoption of container technology is rapidly growing, largely because it is lightweight and easy to manage,” NetRise CEO Thomas Pace said late last year. “However, while containers have changed how many modern applications are designed, deployed, and managed, they appear to be among the weakest cybersecurity links in the software supply chain.” 

Hardened Images 

BellSoft is rolling out Hardened Images, a tool for improving the security of containerized applications in Kubernetes by removing package managers and non-essential components, which the company said will reduce vulnerabilities and limit the attack vectors. They also include a locked configuration that can’t be modified, which keeps attackers from injecting malware or tampering with the runtime environment. 

“Our solution addresses seemingly an impossible task,” BellSoft CEO Alex Belokrylov told Cloud Native Now. “From now on, we can provide a foundation that can be trusted and depended on for years.” 

It’s part of a trend by vendors to ensure the security of containers by removing unnecessary elements that can open them up to security threats. For example, Chainguard has a growing list of its own images in a repository that gives developers access to hardened container images that are free of known-exploited vulnerabilities. 

Not a New Problem 

“This isn’t a new problem,” Belokrylov said. “The industry has been addressing it for decades through various approaches: lightweight Linux distributions, distroless images, and now hardened containers. Each represents an evolution in our collective effort to build more secure systems. What’s fundamentally different today is the convergence of three forces that are transforming this from a technical challenge into a strategic solution.” 

Those forces include global regulatory frameworks that require organizations to ensure unprecedented levels and security accountability and a threat landscape being remade by AI. 

“Vulnerability exploitation that once took weeks or months now happens in days or even hours,” the CEO said. “We’re in a time-based competition, and the clock is accelerating.” 

He added that “large enterprises find themselves in an increasingly untenable position: growing codebases, aging legacy systems, and expanding regulatory requirements, all while the threat environment becomes more sophisticated.” 

Security and Performance 

Bellsoft’s Hardened Images are based on what the vendor calls its “3-in-1” approach that delivers complete security and performance coverage via Java runtime optimization, custom maintenance for the vendor’s Alpaquita Linux OS, and proactive remediation of common vulnerabilities and exposures (CVEs). 

The strategy separates BellSoft from a growing field of firms with container security solutions, Belokrylov said. Most of them focus on vulnerability detection and remediation; a solution also needs to be able to fix bugs, which requires deep expertise in the runtime OS and an understanding of how components fundamentally interact, which he said BellSoft has. 

“That kind of expertise makes the difference when you need actual fixes, not just randomly available patches,” he said.  

A Unified Approach 

However, a challenge is that when an urgent fix is needed, the runtime support can come from one vendor and the hardened images from another, which raises such questions as who validates compatibility and who’s accountable if something breaks. BellSoft’s 3-in-1 approach means the vendor provides support for the Liberica JDK runtime and Alpaquita Linux OS. 

“When an issue emerges, there’s no finger-pointing between different vendors, no integration challenges, no question about who owns the solution,” Belokrylov said. “We do. This represents a shift from the fragmented approach that has dominated the market. From now on, there is an integrated solution built on deep runtime expertise, with clear accountability from day one.”

  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Reddit (Opens in new window) Reddit

Related

  • ← Buoyant to Add MCP Support to Linkerd Service Mesh
  • CNCF: Total Number of Cloud Native Developers Reaches 15.6M →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • DevOps.com
  • SecurityBoulevard.com
No items
You Can’t Just Layer AI on Your Observability Platform: Why Context is King
19 May 2026
You Can’t Just Layer AI on Your Observability Platform: Why Context is King
AppSec in 2026: Security at Machine Speed — or Not at All
18 May 2026
AppSec in 2026: Security at Machine Speed — or Not at All
Multi-Million-Dollar Lessons: What FinOps Maturity Actually Looks Like
14 May 2026
Multi-Million-Dollar Lessons: What FinOps Maturity Actually Looks Like
From Prompt to Exploit: How LLMs Are Changing API Attacks
13 May 2026
From Prompt to Exploit: How LLMs Are Changing API Attacks
Data is the Differentiator for Exposure Management
6 May 2026
Data is the Differentiator for Exposure Management
The Context Engine: Why Consolidation is the Natural Future of AppSec
5 May 2026
The Context Engine: Why Consolidation is the Natural Future of AppSec

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

Docker Inc. Allies with NanoCo to Deploy General-Purpose AI Agent Safely

April 1, 2026

Intruder Adds Container Image Scanning to Cloud Security Platform

April 14, 2026

Pedal to Bare-Metal Kubernetes, Nutanix Forges NKP Metal 

April 8, 2026

Survey: Few IT Teams Can Continuously Optimize Kubernetes Clusters

April 7, 2026

CleanStart Takes Aim at BusyBox to Harden Container Security

April 8, 2026

RECENT POSTS

Argo CD’s Rise and the Future of AI-Driven Deployments
Video Interviews 

Argo CD’s Rise and the Future of AI-Driven Deployments

April 27, 2026 Mike Vizard 0
Configuring NVIDIA NeMo Agent Toolkit With Docker Model Runner 
Contributed Content Docker Observability Social - Facebook Social - LinkedIn Social - X Topics 

Configuring NVIDIA NeMo Agent Toolkit With Docker Model Runner 

April 24, 2026 Siri Varma Vegiraju 0
Kubernetes v1.36 Promotes Stability, Compatibility & Reproducibility
Cloud-Native Development Features Kubernetes News Social - Facebook Social - LinkedIn Social - X Topics 

Kubernetes v1.36 Promotes Stability, Compatibility & Reproducibility

April 22, 2026 Adrian Bridgwater 0
Dockerfile Practices are a DevOps Tax Before They are a Security Concern 
Contributed Content Docker Social - Facebook Social - LinkedIn Social - X Topics 

Dockerfile Practices are a DevOps Tax Before They are a Security Concern 

April 22, 2026 Saqib Jan 0
Report: Utilization of Kubernetes Infrastructure Remains Abysmal
Features Kubernetes in the Enterprise News Social - Facebook Social - LinkedIn Social - X 

Report: Utilization of Kubernetes Infrastructure Remains Abysmal

April 21, 2026 Mike Vizard 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2026 Techstrong Group, Inc. All rights reserved.
×

AI in CI/CD: Where Are You Really?

Step 1 of 7

14%
How would you describe your organization’s current level of AI adoption within your CI/CD pipeline?(Required)
How would you describe your current CI/CD environment?(Required)
In which areas of your software delivery pipeline are you currently using AI? (Select all that apply)(Required)
In which areas of your software delivery pipeline are you considering using AI? (Select all that apply)(Required)
Which AI use cases are delivering, or do you expect to deliver, measurable value in your CI/CD pipeline? (Select up to three)(Required)
What, if anything, is limiting your organization’s progress with AI in CI/CD? (Select up to three)(Required)
How do you expect your use of AI in CI/CD pipelines to change over the next 12–18 months?(Required)

×