Most vulnerabilities and audit gaps originate in the OS layer. Whether an image is open and transparent or proprietary and vendor-controlled fundamentally shapes its security profile.

Three core truths
Community-maintained, general purpose base images.
Common Usage
Multi-Cloud, FedRAMP, Regulated IT
Standardized, open, and ultra-secure.
Common Usage
Multi-Cloud, FedRAMP, Regulated IT
Standardized, open, and ultra-secure.
Common Usage
Multi-Cloud, FedRAMP, Regulated IT
Deterministic builds with pinned dependencies
Predictable patch cadence for critical and full rebuilds
Embedded FIPS 140 validated cryptographic modules
SBOM generated for every image build
Standard Patch Cadence
Critical Fix Tim
Standard Rebuild
Refactor Required
Select a curated LTS Linux image
Swap the image tag in your build
Build and deploy using existing pipelines
Receive continuous hardened updates automatically

Environment variables and paths remain identical.
Compatible with Jenkins, GitLab, GitHub Actions.
Standardizes security across the entire org.
Eliminate inherited risk, standardize hardened images, and accelerate security and compliance from the first layer up.
Most vulnerabilities and audit gaps originate in the OS layer. Whether an image is open and transparent or proprietary and vendor-controlled fundamentally shapes its security profile.
Security instability, compliance drift, runtime failures, and audit challenges typically originate from inherited OS-layer risk - not application code.
Hardening isn’t a one-time artifact. It’s an ongoing process backed by verifiable build integrity and open, standards-based baselines.
All dependencies pinned. No silent upstream changes. Fully reproducible across clusters & clouds
Critical CVEs patched within 7 days. Full-image rebuilds every 14 days. CIS/STIG checks integrated into every cycle.
Embedded FIPS 140-3 validated modules. No overlays or custom integration required. Ready for FedRAMP, DoD, and financial environments.
SBOM (CycloneDX/SPDX) generated for every build. RBOM™ visibility when paired with RapidFort Profiler. Clear lineage for audits and internal security reviews
Keep your workflows exactly the same - with drastically better security and compliance outcomes.
Step 1

Select your curated LTS Linux variant
Step 2

Swap the tag (ubuntu:22.04 → ubuntu:22.04-rf)
Step 3

Build, scan, deploy - without code or pipeline changes
Step 4

Receive hardened, continuously rebuilt versions automatically