Java 17 LTS
linux/amd64 linux/arm64
+
+
Adoptium Upstream Release Metadata
| Source Property | Value |
|---|---|
| Full Version | 17.0.18+8 |
| SemVer | 17.0.18+8 |
| Security Level | psu-18 |
| Upstream Update | ⏱️ 2026-01-21T14:09:15Z |
| Distribution | Eclipse Temurin by Adoptium |
Full Development Suite
Security Policy: Comprehensive environment containing the JDK, shell, and package manager for building and debugging applications.
Artifact Registry
Pull by Version Tag
Pull by Floating Tag
Pull by Immutable Digest (Recommended)
docker pull ghcr.io/taha2samy/java@sha256:78fea4ea6accea25ed0d5013a8fe9843e9494e169a7731acb1438fa775838f52
Security & Compliance Reports
Target: ghcr.io/taha2samy/java@sha256:78fea4ea6accea25ed0d5013a8fe9843e9494e169a7731acb1438fa775838f52 | Scanner: Trivy v0.69.3
-
Total CVEs Found
0
Detected in Image Layers -
Packages Analyzed
45
Verified Dependencies -
Critical / High
0
Immediate Action -
Medium / Low
0
Risk Mitigation
Zero-CVE State Confirmed
Impeccable Security Posture: No known vulnerabilities were detected in the 45 analyzed packages.
Clean Security Signature
No active threats detected in the 45 analyzed components.
Software Bill of Materials (SBOM)
| Component Name | Version | License | Classification |
|---|---|---|---|
apk-tools |
2.14.10-r10 |
GPL-2.0-only | System (Wolfi) |
bash |
5.3-r5 |
GPL-3.0-or-later | System (Wolfi) |
busybox |
1.37.0-r54 |
GPL-2.0-only | System (Wolfi) |
ca-certificates |
20251003-r3 |
MPL-2.0, MIT | System (Wolfi) |
ca-certificates-bundle |
20251003-r3 |
MPL-2.0, MIT | System (Wolfi) |
curl |
8.18.0-r3 |
MIT | System (Wolfi) |
cyrus-sasl |
2.1.28-r46 |
BSD-3-Clause | System (Wolfi) |
gdbm |
1.26-r2 |
GPL-3.0-or-later | System (Wolfi) |
glibc |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
glibc-locale-posix |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
heimdal-libs |
7.8.0-r43 |
BSD-3-Clause | System (Wolfi) |
keyutils-libs |
1.6.3-r38 |
GPL-2.0-or-later, LGPL-2.0-or-later | System (Wolfi) |
krb5-conf |
1.0-r8 |
MIT | System (Wolfi) |
krb5-libs |
1.22.2-r1 |
MIT | System (Wolfi) |
ld-linux |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
libbrotlicommon1 |
1.2.0-r1 |
MIT | System (Wolfi) |
libbrotlidec1 |
1.2.0-r1 |
MIT | System (Wolfi) |
libcom_err |
1.47.3-r3 |
GPL-2.0-or-later, LGPL-2.0-or-later, BSD-3-Clause, MIT | System (Wolfi) |
libcrypt1 |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
libcrypto3 |
3.6.1-r2 |
Apache-2.0 | System (Wolfi) |
libcurl-openssl4 |
8.18.0-r3 |
MIT | System (Wolfi) |
libgcc |
15.2.0-r10 |
GPL-3.0-or-later WITH GCC-exception-3.1 | System (Wolfi) |
libidn2 |
2.3.8-r4 |
GPL-2.0-or-later, LGPL-3.0-or-later | System (Wolfi) |
libldap |
2.6.10-r5 |
OLDAP-2.8 | System (Wolfi) |
libnghttp2-14 |
1.68.0-r1 |
MIT | System (Wolfi) |
libpsl |
0.21.5-r7 |
MIT | System (Wolfi) |
libssl3 |
3.6.1-r2 |
Apache-2.0 | System (Wolfi) |
libstdc++ |
15.2.0-r10 |
GPL-3.0-or-later WITH GCC-exception-3.1 | System (Wolfi) |
libunistring |
1.4.2-r0 |
GPL-2.0-or-later, LGPL-3.0-or-later | System (Wolfi) |
libverto |
0.3.2-r6 |
MIT | System (Wolfi) |
libxcrypt |
4.5.2-r2 |
GPL-2.0-or-later, LGPL-2.1-or-later | System (Wolfi) |
ncurses |
6.6_p20251230-r5 |
MIT | System (Wolfi) |
ncurses-terminfo-base |
6.6_p20251230-r5 |
MIT | System (Wolfi) |
nghttp3 |
1.15.0-r1 |
MIT | System (Wolfi) |
posix-libc-utils |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
posix-libc-utils-bin |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
readline |
8.3-r1 |
GPL-3.0-or-later | System (Wolfi) |
sqlite-libs |
3.51.1-r0 |
blessing | System (Wolfi) |
tzdata |
2026a-r0 |
CC-PDDC | System (Wolfi) |
wolfi-baselayout |
20230201-r28 |
MIT | System (Wolfi) |
wolfi-keys |
1-r13 |
MIT | System (Wolfi) |
zlib |
1.3.2-r1 |
MPL-2.0, MIT | System (Wolfi) |
org.bouncycastle:bc-fips |
2.1.2 |
Java Runtime | |
org.bouncycastle:bctls-fips |
2.1.22 |
Java Runtime | |
org.bouncycastle:bcutil-fips |
2.1.5 |
Java Runtime | |
Supply Chain Transparency
Target: Java Development Kit (JDK) | Profile: Level 1 - Container | Benchmark Ver: docker-cis-1.6.0
-
Automated Score --- 100%
Based on 6 Automated Checks -
Manual Review --- 6
Requires Operational Audit -
Blocking Failures --- 0
Critical Config Errors
Operational Context Required
Automated checks passed. Manual controls (e.g., Content Trust) must be verified at the host level.
Detailed Audit Log
| Status | ID | Control Description | Severity |
|---|---|---|---|
| 4.1 | Ensure a user for the container has been created | HIGH | |
| 4.4 | Ensure images are scanned and rebuilt to include security patches | CRITICAL | |
| 4.6 | Ensure HEALTHCHECK instructions have been added to the container image | LOW | |
| 4.7 | Ensure update instructions are not used alone in the Dockerfile | HIGH | |
| 4.9 | Ensure COPY is used instead of ADD | LOW | |
| 4.10 | Ensure secrets are not stored in Dockerfiles | CRITICAL |
Manual Review Controls
| Status | ID | Control Description | Severity |
|---|---|---|---|
| 4.2 | Ensure that containers use only trusted base images (Manual) | HIGH | |
| 4.3 | Ensure unnecessary packages are not installed in the container (Manual) | HIGH | |
| 4.5 | Ensure Content trust for Docker is Enabled (Manual) | LOW | |
| 4.8 | Ensure setuid and setgid permissions are removed in the images (Manual) | HIGH | |
| 4.11 | Ensure only verified packages are installed (Manual) | MEDIUM | |
| 4.12 | Ensure all signed artifacts are validated (Manual) | MEDIUM |
Audit Legend:
Passed: Hardcoded configuration is correct.
Failed: Violation detected in image layers.
Manual: Host/Infrastructure level responsibility.
Scope: Java Development Kit (JDK) | Guidance Ver: 1.0 | Profile: Container Hardening
-
Image Adherence --- 100%
Verified Configuration -
Infrastructure Dependency --- 4
Cluster-Level Controls -
Actionable Violations --- Zero
Direct Container Risks
Shared Responsibility Disclaimer
The NSA/CISA hardening guidance for Java Development Kit (JDK) focuses on container-level security.
* Image Scope: We enforce non-root users and file system integrity.
* Cluster Scope: Infrastructure controls (e.g., NetworkPolicies, RBAC) must be applied by the Cluster Admin.
Control Matrix (Automated Checks)
| ID | Hardening Control | Severity | Audit Status |
|---|---|---|---|
| 1.0 | Non-root containers | MEDIUM | |
| 1.1 | Immutable container file systems | LOW | |
| 1.2 | Preventing privileged containers | HIGH | |
| 1.3 | Share containers process namespaces | HIGH | |
| 1.4 | Share host process namespaces | HIGH | |
| 1.5 | Use the host network | HIGH | |
| 1.6 | Run with root privileges or with root group membership | LOW | |
| 1.7 | Restricts escalation to root privileges | MEDIUM | |
| 1.8 | Sets the SELinux context of the container | MEDIUM | |
| 1.9 | Restrict a container's access to resources with AppArmor | MEDIUM | |
| 1.10 | Sets the seccomp profile used to sandbox containers. | LOW | |
| 1.11 | Protecting Pod service account tokens | MEDIUM | |
| 1.12 | Namespace kube-system should not be used by users | MEDIUM | |
| 2.0 | Pod and/or namespace Selectors usage | MEDIUM | |
| 4.0 | Use ResourceQuota policies to limit resources | MEDIUM | |
| 4.1 | Use LimitRange policies to limit resources | MEDIUM | |
| 5.1 | Encrypt etcd communication | CRITICAL | |
| 6.1 | Check that encryption resource has been set | CRITICAL | |
| 6.2 | Check encryption provider | CRITICAL | |
| 7.0 | Make sure anonymous-auth is unset | CRITICAL | |
| 7.1 | Make sure -authorization-mode=RBAC | CRITICAL | |
| 8.1 | Audit log path is configure | MEDIUM | |
| 8.2 | Audit log aging | MEDIUM |
Cluster Admin Responsibility (Manual)
| ID | Hardening Control | Severity | Responsibility |
|---|---|---|---|
| 3.0 | Use CNI plugin that supports NetworkPolicy API (Manual) | CRITICAL | |
| 5.0 | Control plan disable insecure port (Manual) | CRITICAL | |
| 6.0 | Ensure kube config file permission (Manual) | CRITICAL | |
| 8.0 | Audit policy is configure (Manual) | HIGH |
Hardening Principles Applied: 1. Non-Root Execution: Container runs as a non-privileged user to limit exploit impact. 2. Verified Toolchain: All system components are sourced from the hardened Wolfi ecosystem. 3. SBOM Transparency: Full CycloneDX SBOM is provided for all included dependencies.
Enforcement Level: Restricted | Scope: Build Environment Isolation | K8s Ver: v1.24+
-
Policy Status
READY
SDK is Restricted-Capable- Rules Satisfied
17 / 17
Baseline + Restricted Policies
- Rules Satisfied
-
Blocking Violations
0
Must Resolve in Dockerfile
Secure Pipeline Ready
The variant satisfies all Static PSS Checks. It is safe to use as a CI/CD build agent in hardened, multi-tenant Kubernetes clusters.
Policy Enforcement Matrix
| ID | Restriction Rule | Severity | Static Audit |
|---|---|---|---|
1 |
HostProcess | HIGH | |
2 |
Host Namespaces | HIGH | |
3 |
Privileged Containers | HIGH | |
4 |
Capabilities | MEDIUM | |
5 |
HostPath Volumes | MEDIUM | |
6 |
host ports | HIGH | |
7 |
AppArmor | HIGH | |
8 |
SELinux | MEDIUM | |
9 |
/proc Mount Type | MEDIUM | |
10 |
Seccomp | MEDIUM | |
11 |
Sysctls | MEDIUM | |
12 |
Volume Types | LOW | |
13 |
Privilege Escalation | MEDIUM | |
14 |
Running as Non-root | MEDIUM | |
15 |
Running as Non-root user | LOW | |
16 |
Seccomp | LOW | |
17 |
Capabilities | LOW |
Why This Matters:
1. Isolation: Prevents access to host network or sensitive kernel namespaces.
2. Least Privilege: Ensuring build agents run as non-root prevents "Escape-to-Host" attacks.
3. Consistency: Matches the security posture of the production Distroless image.
Standard Production Runtime
Security Policy: Standard environment for running Java applications, equipped with a shell and system utilities for operational flexibility.
Artifact Registry
Pull by Version Tag
Pull by Floating Tag
Pull by Immutable Digest (Recommended)
docker pull ghcr.io/taha2samy/java@sha256:2e272f25ab4e96bc7296343f876613ea4d5eff929900ab71d81e5c3bf28912ef
Security & Compliance Reports
Target: ghcr.io/taha2samy/java@sha256:2e272f25ab4e96bc7296343f876613ea4d5eff929900ab71d81e5c3bf28912ef | Scanner: Trivy v0.69.3
-
Total CVEs Found
0
Detected in Image Layers -
Packages Analyzed
25
Verified Dependencies -
Critical / High
0
Immediate Action -
Medium / Low
0
Risk Mitigation
Zero-CVE State Confirmed
Impeccable Security Posture: No known vulnerabilities were detected in the 25 analyzed packages.
Clean Security Signature
No active threats detected in the 25 analyzed components.
Software Bill of Materials (SBOM)
| Component Name | Version | License | Classification |
|---|---|---|---|
apk-tools |
2.14.10-r10 |
GPL-2.0-only | System (Wolfi) |
bash |
5.3-r5 |
GPL-3.0-or-later | System (Wolfi) |
busybox |
1.37.0-r54 |
GPL-2.0-only | System (Wolfi) |
ca-certificates |
20251003-r3 |
MPL-2.0, MIT | System (Wolfi) |
ca-certificates-bundle |
20251003-r3 |
MPL-2.0, MIT | System (Wolfi) |
glibc |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
glibc-locale-posix |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
ld-linux |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
libcrypt1 |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
libcrypto3 |
3.6.1-r2 |
Apache-2.0 | System (Wolfi) |
libgcc |
15.2.0-r10 |
GPL-3.0-or-later WITH GCC-exception-3.1 | System (Wolfi) |
libssl3 |
3.6.1-r2 |
Apache-2.0 | System (Wolfi) |
libstdc++ |
15.2.0-r10 |
GPL-3.0-or-later WITH GCC-exception-3.1 | System (Wolfi) |
libxcrypt |
4.5.2-r2 |
GPL-2.0-or-later, LGPL-2.1-or-later | System (Wolfi) |
ncurses |
6.6_p20251230-r5 |
MIT | System (Wolfi) |
ncurses-terminfo-base |
6.6_p20251230-r5 |
MIT | System (Wolfi) |
posix-libc-utils |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
posix-libc-utils-bin |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
tzdata |
2026a-r0 |
CC-PDDC | System (Wolfi) |
wolfi-baselayout |
20230201-r28 |
MIT | System (Wolfi) |
wolfi-keys |
1-r13 |
MIT | System (Wolfi) |
zlib |
1.3.2-r1 |
MPL-2.0, MIT | System (Wolfi) |
org.bouncycastle:bc-fips |
2.1.2 |
Java Runtime | |
org.bouncycastle:bctls-fips |
2.1.22 |
Java Runtime | |
org.bouncycastle:bcutil-fips |
2.1.5 |
Java Runtime | |
Supply Chain Transparency
Target: Java Runtime Environment (JRE) | Profile: Level 1 - Container | Benchmark Ver: docker-cis-1.6.0
-
Automated Score --- 100%
Based on 6 Automated Checks -
Manual Review --- 6
Requires Operational Audit -
Blocking Failures --- 0
Critical Config Errors
Operational Context Required
Automated checks passed. Manual controls (e.g., Content Trust) must be verified at the host level.
Detailed Audit Log
| Status | ID | Control Description | Severity |
|---|---|---|---|
| 4.1 | Ensure a user for the container has been created | HIGH | |
| 4.4 | Ensure images are scanned and rebuilt to include security patches | CRITICAL | |
| 4.6 | Ensure HEALTHCHECK instructions have been added to the container image | LOW | |
| 4.7 | Ensure update instructions are not used alone in the Dockerfile | HIGH | |
| 4.9 | Ensure COPY is used instead of ADD | LOW | |
| 4.10 | Ensure secrets are not stored in Dockerfiles | CRITICAL |
Manual Review Controls
| Status | ID | Control Description | Severity |
|---|---|---|---|
| 4.2 | Ensure that containers use only trusted base images (Manual) | HIGH | |
| 4.3 | Ensure unnecessary packages are not installed in the container (Manual) | HIGH | |
| 4.5 | Ensure Content trust for Docker is Enabled (Manual) | LOW | |
| 4.8 | Ensure setuid and setgid permissions are removed in the images (Manual) | HIGH | |
| 4.11 | Ensure only verified packages are installed (Manual) | MEDIUM | |
| 4.12 | Ensure all signed artifacts are validated (Manual) | MEDIUM |
Audit Legend:
Passed: Hardcoded configuration is correct.
Failed: Violation detected in image layers.
Manual: Host/Infrastructure level responsibility.
Scope: Java Runtime Environment (JRE) | Guidance Ver: 1.0 | Profile: Container Hardening
-
Image Adherence --- 100%
Verified Configuration -
Infrastructure Dependency --- 4
Cluster-Level Controls -
Actionable Violations --- Zero
Direct Container Risks
Shared Responsibility Disclaimer
The NSA/CISA hardening guidance for Java Runtime Environment (JRE) focuses on container-level security.
* Image Scope: We enforce non-root users and file system integrity.
* Cluster Scope: Infrastructure controls (e.g., NetworkPolicies, RBAC) must be applied by the Cluster Admin.
Control Matrix (Automated Checks)
| ID | Hardening Control | Severity | Audit Status |
|---|---|---|---|
| 1.0 | Non-root containers | MEDIUM | |
| 1.1 | Immutable container file systems | LOW | |
| 1.2 | Preventing privileged containers | HIGH | |
| 1.3 | Share containers process namespaces | HIGH | |
| 1.4 | Share host process namespaces | HIGH | |
| 1.5 | Use the host network | HIGH | |
| 1.6 | Run with root privileges or with root group membership | LOW | |
| 1.7 | Restricts escalation to root privileges | MEDIUM | |
| 1.8 | Sets the SELinux context of the container | MEDIUM | |
| 1.9 | Restrict a container's access to resources with AppArmor | MEDIUM | |
| 1.10 | Sets the seccomp profile used to sandbox containers. | LOW | |
| 1.11 | Protecting Pod service account tokens | MEDIUM | |
| 1.12 | Namespace kube-system should not be used by users | MEDIUM | |
| 2.0 | Pod and/or namespace Selectors usage | MEDIUM | |
| 4.0 | Use ResourceQuota policies to limit resources | MEDIUM | |
| 4.1 | Use LimitRange policies to limit resources | MEDIUM | |
| 5.1 | Encrypt etcd communication | CRITICAL | |
| 6.1 | Check that encryption resource has been set | CRITICAL | |
| 6.2 | Check encryption provider | CRITICAL | |
| 7.0 | Make sure anonymous-auth is unset | CRITICAL | |
| 7.1 | Make sure -authorization-mode=RBAC | CRITICAL | |
| 8.1 | Audit log path is configure | MEDIUM | |
| 8.2 | Audit log aging | MEDIUM |
Cluster Admin Responsibility (Manual)
| ID | Hardening Control | Severity | Responsibility |
|---|---|---|---|
| 3.0 | Use CNI plugin that supports NetworkPolicy API (Manual) | CRITICAL | |
| 5.0 | Control plan disable insecure port (Manual) | CRITICAL | |
| 6.0 | Ensure kube config file permission (Manual) | CRITICAL | |
| 8.0 | Audit policy is configure (Manual) | HIGH |
Hardening Principles Applied: 1. Non-Root Execution: Container runs as a non-privileged user to limit exploit impact. 2. Verified Toolchain: All system components are sourced from the hardened Wolfi ecosystem. 3. SBOM Transparency: Full CycloneDX SBOM is provided for all included dependencies.
Enforcement Level: Restricted | Scope: Build Environment Isolation | K8s Ver: v1.24+
-
Policy Status
READY
SDK is Restricted-Capable- Rules Satisfied
17 / 17
Baseline + Restricted Policies
- Rules Satisfied
-
Blocking Violations
0
Must Resolve in Dockerfile
Secure Pipeline Ready
The variant satisfies all Static PSS Checks. It is safe to use as a CI/CD build agent in hardened, multi-tenant Kubernetes clusters.
Policy Enforcement Matrix
| ID | Restriction Rule | Severity | Static Audit |
|---|---|---|---|
1 |
HostProcess | HIGH | |
2 |
Host Namespaces | HIGH | |
3 |
Privileged Containers | HIGH | |
4 |
Capabilities | MEDIUM | |
5 |
HostPath Volumes | MEDIUM | |
6 |
host ports | HIGH | |
7 |
AppArmor | HIGH | |
8 |
SELinux | MEDIUM | |
9 |
/proc Mount Type | MEDIUM | |
10 |
Seccomp | MEDIUM | |
11 |
Sysctls | MEDIUM | |
12 |
Volume Types | LOW | |
13 |
Privilege Escalation | MEDIUM | |
14 |
Running as Non-root | MEDIUM | |
15 |
Running as Non-root user | LOW | |
16 |
Seccomp | LOW | |
17 |
Capabilities | LOW |
Why This Matters:
1. Isolation: Prevents access to host network or sensitive kernel namespaces.
2. Least Privilege: Ensuring build agents run as non-root prevents "Escape-to-Host" attacks.
3. Consistency: Matches the security posture of the production Distroless image.
Hardened Production Runtime
Security Policy: Minimalist rootfs with zero shell and zero utilities, optimized for high-assurance production environments.
Artifact Registry
Pull by Version Tag
Pull by Floating Tag
Pull by Immutable Digest (Recommended)
docker pull ghcr.io/taha2samy/java@sha256:f6f1bb84127f0e00505bbafa5a54f4d11d58ddf9de6c29f36276aa76aebdaa7d
Security & Compliance Reports
Target: ghcr.io/taha2samy/java@sha256:f6f1bb84127f0e00505bbafa5a54f4d11d58ddf9de6c29f36276aa76aebdaa7d | Scanner: Trivy v0.69.3
-
Total CVEs Found
0
Detected in Image Layers -
Packages Analyzed
15
Verified Dependencies -
Critical / High
0
Immediate Action -
Medium / Low
0
Risk Mitigation
Zero-CVE State Confirmed
Impeccable Security Posture: No known vulnerabilities were detected in the 15 analyzed packages.
Clean Security Signature
No active threats detected in the 15 analyzed components.
Software Bill of Materials (SBOM)
| Component Name | Version | License | Classification |
|---|---|---|---|
ca-certificates |
20251003-r3 |
MPL-2.0, MIT | System (Wolfi) |
ca-certificates-bundle |
20251003-r3 |
MPL-2.0, MIT | System (Wolfi) |
glibc |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
glibc-locale-posix |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
ld-linux |
2.43-r2 |
LGPL-2.1-or-later | System (Wolfi) |
libcrypto3 |
3.6.1-r2 |
Apache-2.0 | System (Wolfi) |
libgcc |
15.2.0-r10 |
GPL-3.0-or-later WITH GCC-exception-3.1 | System (Wolfi) |
libstdc++ |
15.2.0-r10 |
GPL-3.0-or-later WITH GCC-exception-3.1 | System (Wolfi) |
tzdata |
2026a-r0 |
CC-PDDC | System (Wolfi) |
wolfi-baselayout |
20230201-r28 |
MIT | System (Wolfi) |
wolfi-keys |
1-r13 |
MIT | System (Wolfi) |
zlib |
1.3.2-r1 |
MPL-2.0, MIT | System (Wolfi) |
org.bouncycastle:bc-fips |
2.1.2 |
Java Runtime | |
org.bouncycastle:bctls-fips |
2.1.22 |
Java Runtime | |
org.bouncycastle:bcutil-fips |
2.1.5 |
Java Runtime | |
Supply Chain Transparency
Target: Java Runtime Environment (Distroless) | Profile: Level 1 - Container | Benchmark Ver: docker-cis-1.6.0
-
Automated Score --- 100%
Based on 6 Automated Checks -
Manual Review --- 6
Requires Operational Audit -
Blocking Failures --- 0
Critical Config Errors
Operational Context Required
Automated checks passed. Manual controls (e.g., Content Trust) must be verified at the host level.
Detailed Audit Log
| Status | ID | Control Description | Severity |
|---|---|---|---|
| 4.1 | Ensure a user for the container has been created | HIGH | |
| 4.4 | Ensure images are scanned and rebuilt to include security patches | CRITICAL | |
| 4.6 | Ensure HEALTHCHECK instructions have been added to the container image | LOW | |
| 4.7 | Ensure update instructions are not used alone in the Dockerfile | HIGH | |
| 4.9 | Ensure COPY is used instead of ADD | LOW | |
| 4.10 | Ensure secrets are not stored in Dockerfiles | CRITICAL |
Manual Review Controls
| Status | ID | Control Description | Severity |
|---|---|---|---|
| 4.2 | Ensure that containers use only trusted base images (Manual) | HIGH | |
| 4.3 | Ensure unnecessary packages are not installed in the container (Manual) | HIGH | |
| 4.5 | Ensure Content trust for Docker is Enabled (Manual) | LOW | |
| 4.8 | Ensure setuid and setgid permissions are removed in the images (Manual) | HIGH | |
| 4.11 | Ensure only verified packages are installed (Manual) | MEDIUM | |
| 4.12 | Ensure all signed artifacts are validated (Manual) | MEDIUM |
Audit Legend:
Passed: Hardcoded configuration is correct.
Failed: Violation detected in image layers.
Manual: Host/Infrastructure level responsibility.
Scope: Java Runtime Environment (Distroless) | Guidance Ver: 1.0 | Profile: Container Hardening
-
Image Adherence --- 100%
Verified Configuration -
Infrastructure Dependency --- 4
Cluster-Level Controls -
Actionable Violations --- Zero
Direct Container Risks
Shared Responsibility Disclaimer
The NSA/CISA hardening guidance for Java Runtime Environment (Distroless) focuses on container-level security.
* Image Scope: We enforce non-root users and file system integrity.
* Cluster Scope: Infrastructure controls (e.g., NetworkPolicies, RBAC) must be applied by the Cluster Admin.
Control Matrix (Automated Checks)
| ID | Hardening Control | Severity | Audit Status |
|---|---|---|---|
| 1.0 | Non-root containers | MEDIUM | |
| 1.1 | Immutable container file systems | LOW | |
| 1.2 | Preventing privileged containers | HIGH | |
| 1.3 | Share containers process namespaces | HIGH | |
| 1.4 | Share host process namespaces | HIGH | |
| 1.5 | Use the host network | HIGH | |
| 1.6 | Run with root privileges or with root group membership | LOW | |
| 1.7 | Restricts escalation to root privileges | MEDIUM | |
| 1.8 | Sets the SELinux context of the container | MEDIUM | |
| 1.9 | Restrict a container's access to resources with AppArmor | MEDIUM | |
| 1.10 | Sets the seccomp profile used to sandbox containers. | LOW | |
| 1.11 | Protecting Pod service account tokens | MEDIUM | |
| 1.12 | Namespace kube-system should not be used by users | MEDIUM | |
| 2.0 | Pod and/or namespace Selectors usage | MEDIUM | |
| 4.0 | Use ResourceQuota policies to limit resources | MEDIUM | |
| 4.1 | Use LimitRange policies to limit resources | MEDIUM | |
| 5.1 | Encrypt etcd communication | CRITICAL | |
| 6.1 | Check that encryption resource has been set | CRITICAL | |
| 6.2 | Check encryption provider | CRITICAL | |
| 7.0 | Make sure anonymous-auth is unset | CRITICAL | |
| 7.1 | Make sure -authorization-mode=RBAC | CRITICAL | |
| 8.1 | Audit log path is configure | MEDIUM | |
| 8.2 | Audit log aging | MEDIUM |
Cluster Admin Responsibility (Manual)
| ID | Hardening Control | Severity | Responsibility |
|---|---|---|---|
| 3.0 | Use CNI plugin that supports NetworkPolicy API (Manual) | CRITICAL | |
| 5.0 | Control plan disable insecure port (Manual) | CRITICAL | |
| 6.0 | Ensure kube config file permission (Manual) | CRITICAL | |
| 8.0 | Audit policy is configure (Manual) | HIGH |
Hardening Principles Applied: 1. Non-Root Execution: Container runs as a non-privileged user to limit exploit impact. 2. Verified Toolchain: All system components are sourced from the hardened Wolfi ecosystem. 3. SBOM Transparency: Full CycloneDX SBOM is provided for all included dependencies.
Enforcement Level: Restricted | Scope: Build Environment Isolation | K8s Ver: v1.24+
-
Policy Status
READY
SDK is Restricted-Capable- Rules Satisfied
17 / 17
Baseline + Restricted Policies
- Rules Satisfied
-
Blocking Violations
0
Must Resolve in Dockerfile
Secure Pipeline Ready
The variant satisfies all Static PSS Checks. It is safe to use as a CI/CD build agent in hardened, multi-tenant Kubernetes clusters.
Policy Enforcement Matrix
| ID | Restriction Rule | Severity | Static Audit |
|---|---|---|---|
1 |
HostProcess | HIGH | |
2 |
Host Namespaces | HIGH | |
3 |
Privileged Containers | HIGH | |
4 |
Capabilities | MEDIUM | |
5 |
HostPath Volumes | MEDIUM | |
6 |
host ports | HIGH | |
7 |
AppArmor | HIGH | |
8 |
SELinux | MEDIUM | |
9 |
/proc Mount Type | MEDIUM | |
10 |
Seccomp | MEDIUM | |
11 |
Sysctls | MEDIUM | |
12 |
Volume Types | LOW | |
13 |
Privilege Escalation | MEDIUM | |
14 |
Running as Non-root | MEDIUM | |
15 |
Running as Non-root user | LOW | |
16 |
Seccomp | LOW | |
17 |
Capabilities | LOW |
Why This Matters:
1. Isolation: Prevents access to host network or sensitive kernel namespaces.
2. Least Privilege: Ensuring build agents run as non-root prevents "Escape-to-Host" attacks.
3. Consistency: Matches the security posture of the production Distroless image.
FIPS 140-3 Validation Tests
FIPS COMPLIANT Module BC-FJA is active and enforcing Approved Mode.
- Total Tests --- 32
- Passed --- 32
- Failed --- 0
- Time --- 69.79s
Our high-assurance validation lifecycle ensures every artifact meets uncompromising FIPS 140-3 standards. We compile our security suite using a trusted JDK before mounting it into a hardened, isolated JRE runtime. Within this boundary, Bouncy Castle FIPS is strictly injected and set to "Approved Only" mode to block legacy primitives. The engine then executes rigorous positive and negative assertions to verify cryptographic enforcement in real-time. This continuous auditing provides a zero-trust foundation for your mission-critical Java workloads.
Cryptographic Testing Workflow
graph LR
subgraph "Compilation Stage"
A[Java Test Suite] -->|JDK javac| B(Validated Bytecode)
end
subgraph "Execution Boundary"
B -->|Mount| C[Target JRE Image]
D[BCFIPS Provider] -->|Inject| C
E[Strict Policy] -->|approved_only=true| C
end
subgraph "Analysis"
C -->|Run| F{Assert Security}
F -->|Success| G[FIPS Verified]
F -->|Violation| H[Security Breach]
end
style G fill:#00c853,color:#fff
style H fill:#d50000,color:#fff
style C stroke-width:4px
Diagnostics Log
Verify BCJSSE is the mandated SSLContext provider 2.427s
Verify Default KeyStore type is BCFKS for TLS 0.963s
Verify Anonymous Cipher Suites (DH_anon) are rejected 2.532s
Verify Triple-DES Encryption is rejected 1.801s
Verify RC4 Cipher Suites are strictly rejected 2.345s
Verify JVM starts strictly in FIPS Approved Mode 8.431s
Verify BouncyCastle FIPS is the primary security provider 1.934s
Verify PBKDF2WithHmacSHA256 is allowed 1.833s
Verify PBKDF2 with short salt (<128 bits) is rejected 1.82s
Verify JKS Keystore is strictly rejected in FIPS Mode 1.902s
Verify 1024-bit RSA is rejected 1.888s
Verify RSA 2048-bit Key Generation is allowed 1.886s
Verify HMAC-SHA256 is allowed 1.841s
Verify MD5 is strictly rejected 1.84s
Verify 1024-bit DSA Key Generation is rejected 1.836s
Verify TLS 1.0/1.1 are strictly rejected in FIPS Mode 2.486s
Verify MD4 is strictly rejected 1.83s
Verify NULL Encryption Cipher Suites are rejected 2.537s
Verify ECDH Key Agreement using P-256 2.041s
Verify TLS 1.3 Handshake using BCFIPS Provider 2.652s
Verify EC P-256 Key Generation is allowed 1.893s
Verify RSA PKCS#1 v1.5 Encryption is rejected 2.014s
Verify Non-NIST Curve (secp160r1) is rejected 1.824s
Verify Short HMAC Key is rejected 1.905s
Verify BCFKS Keystore is allowed and functional 1.896s
Verify SHA1PRNG is rejected by BCFIPS 1.794s
Verify SecureRandom uses FIPS-Approved DRBG 1.955s
Verify SHA-1 Signature Generation is rejected 2.22s
Verify SHA-256 is allowed by BCFIPS 1.852s
Verify DES is strictly rejected 1.823s
Verify AES-GCM is allowed by BCFIPS 1.891s
Verify AES-CBC with PKCS7 Padding 1.901s