The National Institute of Standards and Technology (NIST) published Special Publication (SP) 800-190, or the Application Container Security Guide, in September 2017 to address security concerns associated with containerized technologies.
Clocking in at a total of 51 pages, the special publication outlines:
To start you on your journey to NIST 800-190 compliance, we’ll summarize the key insights and action items from the special publication here, plus additional tips for achieving and maintaining compliance.
NIST 800-190, also known as the Application Container Security Guide, provides security best practices for containerized applications, focusing on threats, risks, and mitigation strategies across the container ecosystem. The guide helps organizations implement secure containerization in DevSecOps workflows, ensuring compliance and reducing attack surfaces.
It covers topics such as…
The release of the special publication was prompted by the growing adoption of container technology and the security challenges that emerged alongside it. As organizations move toward DevSecOps and cloud native architectures, NIST 800-190 supports related security frameworks, including FedRAMP, DoD cATO, NIST 800-53, and CIS benchmarks.
The following is a simplified checklist for tracking your organization’s compliance with the Application Container Security Guide.
For automated compliance checks, software integrations, and more robust reporting, consider Anchore Enforce, a turnkey FedRAMP or DoD cATO compliance solution.
While the guidelines provided in NIST 800-190 provide a framework for strengthening container security, implementing the best practices proactively, efficiently, and at scale is another story. Here are some expert-driven tips that aren’t explicitly covered in the special publication but can significantly enhance compliance efforts:
NIST 800-190 compliance requires organizations to track and manage all software components in their supply chain. Integrating SBOM management tools into the DevSecOps pipeline ensures compliance from development to deployment, allowing organizations to identify and address risks early—before bad actors reach production.
SBOM-powered solutions like Anchore Enterprise streamline this process by automating SBOM generation at every stage, from source code repositories and CI/CD pipelines to container registries and runtime environments, reducing the manual burden on developers and security teams.
One of the most effective ways to maintain compliance in a DevSecOps environment is by implementing policy-as-code to define and enforce compliance policies at the CI/CD pipeline level. Ensure real-time validation of container images, network configurations, and access controls before deployment, and regularly update policies to align with evolving security standards and organizational requirements.
Traditional compliance frameworks often rely on security audits at the end of the software development lifecycle, leading to costly fixes and deployment delays. Instead, compliance should be shifted left, integrating security early in the development process. This means incorporating automated compliance checks into CI/CD pipelines so developers get instant feedback on vulnerabilities, misconfigurations, and policy violations. Tools like Anchore Enterprise use vulnerability scanning and policy compliance packs to enable security teams to enforce compliance without becoming a bottleneck.
Trying to implement every security control at once can overwhelm teams. Instead of aiming for perfect compliance from day one, focus on high-impact controls that mitigate the most common attack vectors.
First, focus on securing CI/CD pipelines and container images (e.g., implementing signed images and scanning for vulnerabilities). Next, lock down sensitive secrets and IAM permissions before enforcing runtime security (e.g., monitoring container behavior for anomalies).
By taking a phased approach, organizations can maintain compliance without disrupting operations.
Security and compliance often fail because they are invisible—if teams can’t see compliance issues, they won’t fix them. The best way to maintain compliance is to make security data highly visible and accessible. This can be done by:
Tools like Anchore Enterprise make it easy to create detailed, custom reports for security teams to assess impact and trends to help direct remediation efforts. Plus, send auditors evidence of checks being performed and pass/fail status against formal controls.
One of the biggest challenges in compliance is alert fatigue—when security teams are bombarded with thousands of vulnerability alerts, many of which are low-risk or irrelevant. To keep compliance efficient, organizations should:
This allows compliance to be maintained without drowning security teams in unnecessary work.
These two special publications differ in both scope and purpose, with SP 800-53 being much broader in nature. Here’s the difference:
NIST 800-190
NIST 800-53
Similarly, NIST 800-190 is focused on securing containerized applications, while NIST CSF (Cyber Security Framework) provides a broad, adaptable cybersecurity framework that organizations can customize based on their risk management needs.
NIST CSF
Staying compliant with NIST 800-190 can be a challenge, but Anchore Enterprise makes it seamless by automating security checks throughout the container lifecycle. From SBOM analysis to policy enforcement and continuous monitoring, Anchore helps teams catch vulnerabilities early and enforce compliance without slowing development.With Anchore, NIST 800-190 compliance becomes efficient and repeatable—no more manual audits or last-minute fixes. Start a free trial today and take the hassle out of container security.
Streamline and automate policy enforcement with Anchore’s compliance solutions for FedRAMP.