-
Couldn't load subscription status.
- Fork 101
Adding initial docs for Chainguard VMs #2703
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
✅ Deploy Preview for ornate-narwhal-088216 ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pretty polished stuff. I mostly suggested adding links and small edits. 👍
|
|
||
| ## Compliance and SLAs | ||
|
|
||
| Chainguard VMs (running Chainguard OS) are intentionally designed to minimize risk, maximize transparency, and satisfy security standards such as CIS Benchmarks, FedRAMP, SOC 2, and others. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we link to some of our own content on the ATO processes (fedramp etc)
|
|
||
| Chainguard VMs (running Chainguard OS) are intentionally designed to minimize risk, maximize transparency, and satisfy security standards such as CIS Benchmarks, FedRAMP, SOC 2, and others. | ||
|
|
||
| * CVE remediation backed by an industry-leading SLA: 7 days for critical, 14 days for all others |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Link to our SLA page
|
|
||
| ## Learn More and Get Started | ||
|
|
||
| Chainguard VMs are available through a subscription. To learn more and get started today, use [this form](https://get.chainguard.dev/vmearlyaccesswaitlist?utm_source=cg-academy&utm_medium=referral&utm_campaign=dev-enablement). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"use this form" seems a little abrupt, maybe "join the waitlist" or something more descriptive.
|
|
||
| ## What are Container Host VMs and which versions are available? | ||
|
|
||
| Container Host VMs allow you to run containerized workloads on a hardened VM runtime. We currently offer container host VMs for AWS Container Services ECS and EKS, and also for native compute instances on AWS EC2, Google Compute Engine, and Azure Compute. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
More links here might be good
|
|
||
| ## Do Chainguard VMs support FIPS? | ||
|
|
||
| Yes, Chainguard VMs support Kernel Independent FIPS. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this needs more elaboration (or leave it out as it raises more questions than it answers). Are there FIPS versions of the containers? Why would there be kernel-indep FIPS if there's a kernel shipped with the VM?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You answer pretty well below but still think it might be best to consolidate or take out.
|
|
||
| This is more relevant in on-prem environments. | ||
|
|
||
| Chainguard VMs support kernel independent FIPS. This means that application workloads use a FIPS validated entropy source independent of the kernel. The advantage to this approach is that the certification of the entropy source does not need to be performed against a specific kernel, so customers can take advantage of new kernel features while remaining FIPS compliant. It also means that VMs no longer need to be booted in FIPS mode. The disadvantage is that some low level operating system functions such as disk encryption, IPSEC etc.. are not able to use FIPS validated entropy. In clouds, disk volumes are encrypted and provided with FIPS validated entropy, as is network and filesystem encryption. In cloud, kernel independent FIPS is a more efficient way of servicing FIPS workloads in VMs. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
in clouds > on cloud platforms
in cloud (at end) > on the cloud
Co-authored-by: Patrick Smyth <[email protected]> Signed-off-by: Erika Heidi <[email protected]>
Co-authored-by: Patrick Smyth <[email protected]> Signed-off-by: Erika Heidi <[email protected]>
Co-authored-by: Patrick Smyth <[email protected]> Signed-off-by: Erika Heidi <[email protected]>
Co-authored-by: Patrick Smyth <[email protected]> Signed-off-by: Erika Heidi <[email protected]>
This PR adds initial docs for Chainguard VMs. It creates a new top-level item in the menu under "Libraries". Two documentation pages are included: "Overview" and "FAQ".
Preview Links: