Minimus Delivers Zero-CVE Container Images with Contractual Guarantees and Self-Service Customization

The News

At KubeCon North America 2025, Minimus showcased its platform delivering continuously built, source-based, distroless container images with contractually guaranteed zero CVEs at delivery and 48-hour remediation commitments for new upstream vulnerabilities. The company addresses the persistent challenge of official container images containing 50-60 vulnerabilities, with 15-20 rated high or critical, by rebuilding equivalent functionality from source with zero CVEs. Minimus announced a new self-service customization capability allowing customers to tailor any of the thousand-plus images in its library by adding packages such as CURL or NMAP, with the company maintaining these private, customized images indefinitely under the same SLA guarantees. The platform enables organizations to fully outsource vulnerability management for container images, reducing security risk and operational burden for DevSecOps teams while accelerating release cycles often delayed by vulnerability remediation. Minimus reports strong adoption in the public sector, driven by requirements like FedRAMP mandating FIPS compliance, where the company’s secure images address stringent regulatory standards. The company’s value proposition centers on eliminating the intractable burden of managing vulnerabilities in base images, allowing development teams to focus on application-level security rather than infrastructure-layer CVE remediation.

Analyst Take

Minimus addresses a fundamental tension in container security with the gap between vulnerability scanning capabilities and remediation capacity. Our DevSecOps research found that 50.9% of organizations scan for vulnerabilities weekly and 26.7% scan daily, but scanning frequency does not correlate with remediation effectiveness. Organizations generate extensive vulnerability reports but struggle to prioritize and fix issues at the pace they are discovered, creating persistent backlogs that security teams cannot clear. The claim that official NGINX images contain 50-60 vulnerabilities with 15-20 high or critical aligns with patterns we’ve observed where base images accumulate CVEs from underlying OS packages and dependencies that application teams have limited ability to remediate. By rebuilding images from source and maintaining them continuously, Minimus shifts the remediation burden from customers to the vendor, converting an operational problem into a procurement decision.

The contractual guarantee of zero CVEs at delivery and 48-hour remediation for new vulnerabilities represents a significant commitment that differentiates Minimus from traditional image registries or scanning tools. The effectiveness of this guarantee depends on several factors that require scrutiny. First, the definition of “zero CVEs” matters. Does this include all CVEs in the National Vulnerability Database, or only those meeting certain severity thresholds? Some CVEs have disputed applicability or affect components not actually exploitable in the image’s runtime context. Second, the 48-hour remediation window assumes Minimus can rebuild and test images faster than customers, which is plausible for base images but becomes more complex for customized images with added packages. Third, the guarantee’s value depends on how quickly customers can deploy updated images because a 48-hour vendor SLA provides limited benefit if customer deployment processes require weeks of testing and approval.

The self-service customization capability addresses a critical limitation of pre-built secure images since they rarely match exact operational requirements. Development teams often need specific utilities, debugging tools, or runtime dependencies that minimal base images exclude. Historically, this forced a choice between accepting vendor-maintained secure images that lack needed functionality or customizing images and losing vendor support. Minimus’s approach of maintaining customized images indefinitely under the same SLA bridges this gap, but it also introduces scaling challenges. As customers create hundreds or thousands of customized image variants, Minimus must rebuild and test each variant whenever upstream vulnerabilities emerge. The operational complexity of managing this long tail of customized images could strain Minimus’s ability to meet 48-hour remediation commitments as the customer base and customization diversity grow.

The public sector adoption driven by FedRAMP and FIPS compliance requirements highlights Minimus’s positioning in highly regulated markets where security guarantees carry contractual and liability weight. Government and defense contractors face stringent security requirements that make vulnerability backlogs not just operational problems but compliance failures that can jeopardize contracts. For these organizations, outsourcing vulnerability management to a vendor with contractual SLAs provides audit trail and risk transfer that justify premium pricing. This positioning also creates dependency risk, though, since organizations relying on Minimus for base image security must trust the vendor’s long-term viability and ability to maintain SLAs as the threat landscape evolves. The distroless, source-based approach provides transparency and reduces attack surface, but customers must evaluate whether Minimus’s rebuild process introduces supply chain risks that offset the CVE elimination benefits.

Looking Ahead

Minimus’s success depends on demonstrating sustained ability to meet 48-hour remediation commitments as the scale and complexity of its image library grows. Early customers with relatively standard image requirements may experience flawless service, but as the platform onboards enterprises with diverse, heavily customized images, the operational challenge of maintaining zero-CVE guarantees across thousands of variants will test the company’s processes and automation. The next 12-18 months will reveal whether Minimus can scale its rebuild and testing infrastructure to handle the long tail of customization without degrading SLA performance. Customer retention will depend not just on initial zero-CVE delivery but on consistent, rapid remediation over years as new vulnerability classes emerge and upstream dependencies evolve.

The competitive landscape for container security is intensifying as multiple vendors target the vulnerability management problem from different angles. Image scanning tools like Snyk and Aqua provide visibility but leave remediation to customers. Distroless base images from Google and Chainguard reduce attack surface but require customers to maintain them. Minimus’s fully managed approach with contractual guarantees occupies a distinct position, but it also faces pricing pressure from free or lower-cost alternatives that shift responsibility back to customers. The company’s ability to expand beyond early adopters into commercial enterprises will depend on demonstrating ROI that justifies the premium over self-managed alternatives. As Kubernetes and container adoption mature, organizations will increasingly evaluate whether outsourcing base image security delivers sufficient value or whether investing in internal vulnerability management capabilities provides better long-term control and cost efficiency. Minimus must prove that its managed service model remains economically attractive as customer security maturity increases and internal capabilities improve.

Authors

  • Paul Nashawaty

    Paul Nashawaty, Practice Leader and Lead Principal Analyst, specializes in application modernization across build, release and operations. With a wealth of expertise in digital transformation initiatives spanning front-end and back-end systems, he also possesses comprehensive knowledge of the underlying infrastructure ecosystem crucial for supporting modernization endeavors. With over 25 years of experience, Paul has a proven track record in implementing effective go-to-market strategies, including the identification of new market channels, the growth and cultivation of partner ecosystems, and the successful execution of strategic plans resulting in positive business outcomes for his clients.

    View all posts
  • With over 15 years of hands-on experience in operations roles across legal, financial, and technology sectors, Sam Weston brings deep expertise in the systems that power modern enterprises such as ERP, CRM, HCM, CX, and beyond. Her career has spanned the full spectrum of enterprise applications, from optimizing business processes and managing platforms to leading digital transformation initiatives.

    Sam has transitioned her expertise into the analyst arena, focusing on enterprise applications and the evolving role they play in business productivity and transformation. She provides independent insights that bridge technology capabilities with business outcomes, helping organizations and vendors alike navigate a changing enterprise software landscape.

    View all posts