Controlling Artifacts in Images for Maximum Security

Verifying Artifacts for Security and Data Integrity

Artifacts (any files in the images), like the images themselves, are of unknown origin. (M025) There is no way to control how the artifacts were created or what they contain.  

Files obtained from uncontrolled sources may contain undesirable features or malicious code.

Where possible, artifacts should only be obtained from trusted sources and verified using appropriate methods (e.g., PGP keys). In the case of open-source software, consider building it yourself.

follow these measures

Any Questions?

Please feel free to contact us for any question that is not answered yet. 

We are looking forward to get in contact with you!


Design Escapes

KubeOps GmbH
Hinter Stöck 17
72406 Bisingen

  • Telefon:

    +49 7433 93724 90

  • Mail:

    This email address is being protected from spambots. You need JavaScript enabled to view it.

Download Area
Certified as

KubeOps GmbH is the owner of the Union trademark KubeOps with the registration number 018305184. 

© KubeOps GmbH. All rights reserved. Subsidiary of