The Red Hat Ecosystem Catalog is the official source for discovering and learning more about the Red Hat Ecosystem of both Red Hat and certified third-party products and services.
We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.
The Universal Base Image with selected STIG hardening is designed and engineered to be a base layer for all of your containerized applications, middleware and utilities where hardening is desired. Applied controls are derived from the DISA approved STIG. This base image is freely redistributable, but Red Hat only supports Red Hat technologies through subscriptions for Red Hat products. This image is maintained by Red Hat and updated regularly. To properly harden containerized applications, a relevant subset of controls from the DISA STIG have been applied. This approach effectively reduces the attack surface by minimizing package footprint and preventing unnecessary access.
The following information was extracted from the dockerfile and other sources.
| Canonical image ID | Red Hat Universal Base Image 9 with select STIG hardening |
| Summary | Red Hat Universal Base Image (UBI) with selected STIG hardening for containerized applications. |
| Description | The Universal Base Image with selected STIG hardening is designed and engineered to be a base layer for all of your containerized applications, middleware and utilities where hardening is desired. Applied controls are derived from the DISA approved STIG. This base image is freely redistributable, but Red Hat only supports Red Hat technologies through subscriptions for Red Hat products. This image is maintained by Red Hat and updated regularly. To properly harden containerized applications, a relevant subset of controls from the DISA STIG have been applied. This approach effectively reduces the attack surface by minimizing package footprint and preventing unnecessary access. |
| Provider | Red Hat |
| Maintainer | Red Hat, Inc. |
| Repository name | ubi9/ubi-stig |
| Image version | 9.7 |
| Architecture | amd64 |
Use a registry service account token to authenticate your container client. This allows you to pull images without using your personal Red Hat credentials, which is recommended for CI/CD pipelines and automated deployments.
Run the following command, then enter your registry token credentials when prompted by the terminal.
Pull the image
Use the following instructions to get images from a Red Hat container registry using your Red Hat login.
Run the following command, then enter your login credentials when prompted by the terminal.
Pull the image
Use the following instructions to get images from a Red Hat container registry without providing authentication.
Use the following command(s) from a system with podman installed.
A source manifest is available for each Red Hat product container image and includes a list of the representative open source packages used in the image. These manifests are publicly available at:
ftp.redhat.com/pub/redhat/containers/To view a list of the open source packages used in a specific container image, choose the namespace, repository, and tag to find the appropriate source manifest.
Example| Namespace | Repository | Tag |
|---|---|---|
| ubi9/ | ubi-stig | 9.7-1773190642.txt |
A listing of every version of source packages used in published container images is publicly available at:
ftp.redhat.com/pub/redhat/containers/src.index.html