
Standardize Every Container Image Without Slowing Delivery
Standardize Every Container Image Without Slowing Delivery
One registry for all clusters and clouds. Continuous hardening. Zero drift.
One registry for all clusters and clouds. Continuous hardening. Zero drift.

100 consistency across every cluster and cloud

100 consistency across every cluster and cloud

60-70 reduction in vulnerability noise from scanners

60-70 reduction in vulnerability noise from scanners

<1 hour to standardize Dockerfiles across your environment

<1 hour to standardize Dockerfiles across your environment




Standardize Every Container Image Without Slowing Delivery
One registry for all clusters and clouds. Continuous hardening. Zero drift.

100% consistency across every cluster and cloud

60-70% reduction in vulnerability noise from scanners

<1 hour to standardize Dockerfiles across your environment


The Challenge Modern Platform Teams Face
The Challenge Modern Platform Teams Face
The pain, by the numbers:
We tried the usual fix: dump it on the devs. The so-called Shift Left. But after over a decade, let's be honest...Shift Left is a failure of epic proportions. Here's the pain, by the numbers:
The pain, by the numbers:

of the same image running across infrastructure
50+ versions

of "the same" `node:18` image running across infrastructure
50+ versions

of the same image running across infrastructure
50+ versions

(ECR, GCR, ACR, Docker Hub) to manage
6+ registries

(ECR, GCR, ACR, Docker Hub) with inconsistent patching policies
6+ registries

(ECR, GCR, ACR, Docker Hub) to manage
6+ registries

spent chasing down drifted images
20-30 hours/week

spent chasing down drifted images, tracking who's on what version
20-30 hours/week

spent chasing down drifted images
20-30 hours/week

to audit with no single source of truth
Impossible

"which services are running vulnerable `python:3.9`?" takes 2 days to answer
Impossible to audit

to audit with no single source of truth
Impossible
Platform teams battle image sprawl, with slightly different base layers across squads, custom patches, and manual rebuilds that never stay current. Image drift multiplies vulnerabilities, causes flaky builds, and makes it impossible to enforce a golden image. Meanwhile, compliance demands more proof, and developers expect frictionless pipelines.
Platform teams battle image sprawl: Team 1 uses official `ubuntu:22.04` (118 CVEs), Team 2 uses a custom-patched fork (unknown CVE count, no update path), Team 3 uses Chainguard Wolfi (requires rewriting Dockerfiles), and Team 4 is still on `ubuntu:20.04` because "if it ain't broke..." When security asks "are we FedRAMP ready?" the platform team spends a week just figuring out what's deployed. The golden image policy exists in a Confluence doc, but reality is anarchy.
Platform teams battle image sprawl, with slightly different base layers across squads, custom patches, and manual rebuilds that never stay current. Image drift multiplies vulnerabilities, causes flaky builds, and makes it impossible to enforce a golden image. Meanwhile, compliance demands more proof, and developers expect frictionless pipelines.


How Root solves this
How Root solves this
Root delivers a curated, version-controlled catalog of in-place patched images that drop into your existing registries.
We say, it's time to Shift Out. Root's Shift Out Platform is powered by thousands of AI agents trained to detect, patch, and validate vulnerabilities for any piece of open source code. Root Image Catalog (RIC) delivers a curated, version-controlled catalog of in-place patched images that drop into your existing registries—one source of truth, zero drift, continuous remediation.
Root delivers a curated, version-controlled catalog of in-place patched images that drop into your existing registries.

Replace official images with Root equivalents such as Alpine, Debian, Ubuntu, and runtimes via a single prefix change.

Replace official images with Root equivalents such as Alpine, Debian, Ubuntu, and runtimes via a single prefix change.

Replace with Root equivalents
Change `FROM ubuntu:22.04` to `FROM cr.root.io/ubuntu:22.04`. Every team uses the same zero-CVE base. Drift eliminated.

Replace official images with Root equivalents such as Alpine, Debian, Ubuntu, and runtimes via a single prefix change.

Maintain full version history and pull any tag from the last 3 to 5 years without CVEs

Maintain full version history and pull any tag from the last 3 to 5 years without CVEs

Full version history, continuously patched
Need `python:3.9.7` from 18 months ago? Root Image Catalog (RIC) has it—patched and maintained. Every version from the last 3-5 years, kept current with 30-day registry SLA for Critical/High vulnerabilities.

Maintain full version history and pull any tag from the last 3 to 5 years without CVEs

Synchronize ARM64 and AMD64 builds so multi-arch deployments stay aligned

Synchronize ARM64 and AMD64 builds so multi-arch deployments stay aligned

One catalog, all teams
2,000+ images covering Alpine, Debian, Ubuntu, Python, Node, Java, Go, Ruby, PHP, Rust, .NET, and 40+ more. Both AMD64 and ARM64 synchronized—multi-arch deployments stay aligned. Single registry feed for all squads—no more "which ECR has the patched images?"

Synchronize ARM64 and AMD64 builds so multi-arch deployments stay aligned

Provide attested evidence for each image to satisfy security and compliance teams

Provide attested evidence for each image to satisfy security and compliance teams

Complete evidence chain
Attested evidence (provenance, attestation, SBOM (CycloneDX), VEX) for every image—security and compliance satisfied. Audit-ready documentation for every deployment.

Provide attested evidence for each image to satisfy security and compliance teams

Key Capabilities for Platform DevOps Leaders

Curated Root Image Catalog (RIC)
2,000+ base OS and runtime images rebuilt from source with a 30 day registry remediation SLA for Critical and High vulnerabilities

Curated Root Image Catalog (RIC)
2,000+ base OS and runtime images rebuilt from source with a 30 day registry remediation SLA for Critical and High vulnerabilities

Curated Root Image Catalog (RIC)
2,000+ base OS and runtime images rebuilt from source with a 30 day registry remediation SLA for Critical and High vulnerabilities

Full Version History
Access long tail tags such as python:3.9.7 without the vulnerability baggage, covering any version from the last 3 to 5 years

Full Version History
Access long tail tags such as python:3.9.7 without the vulnerability baggage, covering any version from the last 3 to 5 years

Full Version History
Access long tail tags such as python:3.9.7 without the vulnerability baggage, covering any version from the last 3 to 5 years

Dual Architecture Support
Consistent AMD64 and ARM64 images with identical hardening

Dual Architecture Support
Consistent AMD64 and ARM64 images with identical hardening

Dual Architecture Support
Consistent AMD64 and ARM64 images with identical hardening

Evidence on Pull
Every image includes provenance, attestation, SBOM, VEX, and malware scans for instant trust

Evidence on Pull
Every image includes provenance, attestation, SBOM, VEX, and malware scans for instant trust

Evidence on Pull
Every image includes provenance, attestation, SBOM, VEX, and malware scans for instant trust

Key Capabilities for Platform DevOps Leaders

Curated Root Image Catalog (RIC)
2,000+ base OS and runtime images rebuilt from source with a 30 day registry remediation SLA for Critical and High vulnerabilities

Full Version History
Access long-tail tags (e.g., `python:3.9.7`) without the vulnerability baggage—any version from the last 3-5 years.

Dual Architecture Support
Publish consistent AMD64 and ARM64 images with identical hardening.

Evidence on Pull
Every image includes provenance, attestation, SBOM, VEX, and malware scans for instant trust


See How Leading Platform Teams Use Root
“Root helped us win defense projects by proving compliance without delays. Their ability to provide FIPS compliant, patched versions was a game changer.”

Sam Stenton, Head of DevOps, SiXWorks
Why Root Works for Platform Teams
Why Root Works for Platform Teams
Root makes golden images achievable and sustainable.

End image drift and keep every service on the same zero CVE baseline

End image drift and keep every service on the same zero CVE baseline

End image drift
Keep every service on the same zero-CVE baseline.

End image drift and keep every service on the same zero CVE baseline

Accelerate onboarding with secure images available on day one

Accelerate onboarding with secure images available on day one

Accelerate onboarding
Developers pull secure images on day one.

Accelerate onboarding with secure images available on day one

Reduce rebuild effort by eliminating custom patches across dozens of repos

Reduce rebuild effort by eliminating custom patches across dozens of repos

Reduce rebuild effort
Stop maintaining custom patches across dozens of repos.

Reduce rebuild effort by eliminating custom patches across dozens of repos

Earn trust with evidence through signed, shareable artifacts

Earn trust with evidence through signed, shareable artifacts

Earn trust with evidence
Share signed artifacts to satisfy security, compliance, and customer reviews.

Earn trust with evidence through signed, shareable artifacts

Plugs Into Your Registry and CI/CD
Root integrates directly with your existing infrastructure. No migration required.
AWS ECR • Docker Hub • GCR or GAR • GitHub Actions • GitLab CI • Argo CD • Flux • Jenkins

Plugs Into Your Registry and CI/CD
Root integrates directly with your existing infrastructure. No migration required.
AWS ECR • Docker Hub • GCR or GAR • GitHub Actions • GitLab CI • Argo CD • Flux • Jenkins

Plugs Into Your Registry and CI/CD
Root integrates directly with your existing infrastructure. No migration required.
AWS ECR • Docker Hub • GCR or GAR • GitHub Actions • GitLab CI • Argo CD • Flux • Jenkins
The Root impact

per week saved by eliminating manual tracking across registries
20 to 30 hours

per week saved by eliminating manual tracking across registries
20 to 30 hours

drift eliminated across all squads and clusters
0+ versions → 1 canonical source

per week saved by eliminating manual tracking across registries
20 to 30 hours

audit trail for simplified compliance reporting
One single

audit trail for simplified compliance reporting
One single

not a Confluence doc, an enforced standard
Golden image policy becomes reality

audit trail for simplified compliance reporting
One single

consistency with every cluster pulling from the same zero CVE source
100 percent

consistency with every cluster pulling from the same zero CVE source
100 percent

every cluster, every cloud, every team pulling from the same zero-CVE Root Image Catalog (RIC)
100% consistency

consistency with every cluster pulling from the same zero CVE source
100 percent

coverage for AWS, Azure, GCP, and private registries
Full multi-cloud

coverage for AWS, Azure, GCP, and private registries
Full multi-cloud

AWS ECR, Azure ACR, GCP GCR, Docker Hub, private registries all supported
Full multi-cloud coverage

coverage for AWS, Azure, GCP, and private registries
Full multi-cloud
Got questions?
Got questions?
Do we need to change our Dockerfiles?
How do we standardize images across multiple teams and clouds?
Do we need to change our Dockerfiles?
Just swap the image reference. FROM ubuntu:22.04 becomes FROM cr.root.io/ubuntu:22.04.
Just swap the image reference—`FROM ubuntu:22.04` becomes `FROM cr.root.io/ubuntu:22.04`. Every team uses the same zero-CVE base. One catalog, all teams, zero drift across AWS, Azure, GCP, and private registries.
Just swap the image reference. FROM ubuntu:22.04 becomes FROM cr.root.io/ubuntu:22.04.
Can Root cover custom or private base images?
How do we maintain consistency across AMD64 and ARM64 deployments
Can Root cover custom or private base images?
Yes. We onboard private builds into the catalog and keep them remediated alongside public ones.
Every catalog entry ships for both AMD64 and ARM64 with identical hardening. Multi-arch deployments stay aligned automatically.
Yes. We onboard private builds into the catalog and keep them remediated alongside public ones.
How often are images rebuilt?
What if we need an older version that's no longer maintained?
How often are images rebuilt?
Continuous monitoring triggers rebuilds as soon as new CVEs appear. Median publish time is under three minutes.
Root Image Catalog (RIC) maintains full version history—any version from the last 3-5 years, continuously patched. Need `python:3.9.7` from 18 months ago? We have it, patched and maintained.
Continuous monitoring triggers rebuilds as soon as new CVEs appear. Median publish time is under three minutes.
Does Root support ARM64 environments?
Are .NET images supported?
Does Root support ARM64 environments?
Yes. Every catalog entry ships for AMD64 and ARM64.
Root focuses exclusively on Linux-based container ecosystems. Windows remediation is not supported at this time.
Yes. Every catalog entry ships for AMD64 and ARM64.
Are Windows containers supported?
Can Root cover our custom or private base images?
Are Windows containers supported?
No. Root focuses exclusively on Linux based container ecosystems.
Yes. We onboard private builds into the catalog and keep them remediated alongside public ones. Your custom images get the same zero-CVE treatment as public ones.
No. Root focuses exclusively on Linux based container ecosystems.

Ready to lock down your golden images?
Join platform teams running consistent, secure stacks with Root’s curated catalog.

Ready to lock down your golden images?
Join platform teams running consistent, secure stacks with Root’s curated catalog.

Ready to lock down your golden images?
Join platform teams running consistent, secure stacks with Root’s curated catalog.