Container Compliance

Enforce software container compliance.

Prove compliance for CIS Benchmarks, NIST, FedRAMP, DISA STIGs, CISA Known Exploited Vulnerabilities and more.
sample of policy bundles

Comply with Standards

Get started quickly with predefined policy packs to ease compliance with standards including NIST, CIS, HIPAA, PCI, FedRAMP, DISA STIGs, CISA Known Exploited Vulnerabilities and more.
Example of policy definitions in JSON and in the UI

Easy to Customize.

Meet internal and external standards with policy-based compliance controls customized to your organization’s unique requirements.
Integrate with CI/CD and receive compliance alerts.

Empower DevOps.

Embed fully-automated compliance checks into your CI/CD pipeline. Receive compliance alerts through the developer tools you already use.

Comprehensive Container Compliance Tools.


Leverage automated policies to comply with NIST container security standards detailed in NIST SP 800-190.

CIS Docker

Streamline compliance with Center for Internet Security (CIS) Docker Benchmarks with an out-of-the-box CIS Policy Pack.


Fully automate Software Technical Integration Guide (STIG) checks for containers running in a Kubernetes cluster and give security teams a single dashboard to report on DISA STIG compliance issues.


Use a pre-built FedRAMP policy pack to quickly achieve authority to operate (ATO) and meet FedRAMP's Vulnerability Scanning Requirements for Containers compliance standards.

Explore our solutions

Federal Compliance

Automate compliance checks using out-of-the-box and custom policies.

Open Source Security

Improve open source security by easily tracking direct and transitive open source dependencies to identify and fix vulnerabilities early.


Automate DevSecOps for your cloud-native software supply chain with an API-first DevSecOps solution.

Container Security

Identify and remediate container security risks and monitor post-deployment for new vulnerabilities.

FedRAMP Vulnerability Scanning

Meet the new FedRAMP Vulnerability Scanning Requirements for Containers and achieve compliance faster with Anchore.

Container Vulnerability Scanning

Reduce false positives and false negatives with best-in-class signal-to-noise ratio.

Kubernetes Images Scanning

Allow or prevent deployment of images based on flexible policies and continuously monitor the inventory of insecure images running in your clusters.

Container Registry Scanning

Identify and remediate new risks and vulnerabilities as they emerge.

CI/CD Security & Compliance

Embed security and compliance into your CI/CD pipeline to uncover vulnerabilities, secrets, and malware in your automated build processes.

Software Bill of Materials

Get comprehensive visibility of your software components and ensure vulnerability accuracy with the most complete SBOM available. Generate, store, analyze, and monitor SBOMs across the application lifecycle to identify software dependencies and improve supply chain security.

Container Compliance

Automate compliance checks using out-of-the-box and custom policies.

Speak with our security experts

Learn how Anchore’s SBOM-powered platform can help secure your software supply chain.