SHARE
Facebook X Pinterest WhatsApp

Strategies for Container-Related Incidents Impact Security Goals

BellSoft survey of 427 developers finds gaps between container security detection and remediation, with time, tooling, and human error driving higher risk.

Written By
thumbnail
Jordan Smith
Jordan Smith
Jan 29, 2026
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A recent survey from BellSoft, a software products and technologies company that primarily contributes to OpenJDK, found that the tools and strategies organizations use to protect themselves against container-related incidents are undermining their overall security goals.

427 developers provide insights into often flawed security practices

While the container ecosystem continues to mature, this report emphasizes that there are still fundamental questions about security practices in this space.

BellSoft surveyed 427 developers for this report, which provided insights into how developers select and build container images, the security practices they follow, the challenges they encounter, and how current security practices can fall short of helping them achieve their goals.

Advertisement

Key findings from the survey point to gaps between disclosure and remediation efforts

Among the report’s key findings is that nearly one in four respondents (23 percent) said they have experienced a security incident. 

The report reveals that the gap between disclosure and remediation is the issue, not detection.

49 percent of respondents said that time and resource constraints are a primary challenge in maintaining container security.

Additionally, the report found that root causes can range from strategy to tooling to human error:

  • 62 percent of those surveyed said human error was the biggest contributor to container security mistakes.
  • 54 percent of developers said that shells were the most essential tools inside the base container, while 39 percent said package managers were. Package managers expand the attack surface both directly and through enabling the runtime installation of additional unnecessary components.
    • BellSoft says that combining these with other non-essential tools creates substantial vulnerability exposure in production environments. A more practical approach is to use hardened minimal runtime images, paired with fuller “debug builds” during development, to enable both security and diagnostics without compromise.
  • 55 percent reported using general-purpose Linux distributions (Ubuntu/Debian or Red Hat-based systems) with hundreds of packages that their applications never use.
    • According to BellSoft, each of these represents a potential vulnerability that requires a security patch, and when a vulnerability emerges, security teams must evaluate its impact and coordinate across thousands of instances.
  • 45 percent said trusted registries, and 43 percent said vulnerability scanning, were the most commonly employed security mechanisms.
    • These are basic approaches to container security, BellSoft says, in which organizations constantly respond to newly discovered vulnerabilities rather than building foundations to minimize exposure.
  • 31 percent say they update container images with every release, while 26 percent do so only when critical vulnerabilities emerge. 
  • Further, 33 percent update images monthly, rarely, or only a few times annually, which creates a substantial risk to applications and organizations.
Advertisement

Potential solutions include the adoption of hardened images

“Across every section of the survey, one message repeats consistently: Teams want security efficiency and simplicity, but their current strategies and tooling makes this difficult to achieve,” said Alex Belokrylov, CEO at BellSoft. 

“By adopting hardened images, much of the ongoing security and maintenance responsibility shifts to the image vendor, reducing operational burden and total cost of ownership, while enabling more stable, low-maintenance, and highly secure container environments,” Belokrylov continued.

Additionally, in addressing the container security problem, 48 percent said pre-hardened, security-focused base images would be most helpful for ensuring container security.

Hardened vendor-maintained images address the root causes of modern container security challenges. They help reduce vulnerability exposure, operational strain, cloud costs, and the risk of human error.

When considering security goals and posture, channel organizations must also account for the risks AI now poses. Read more about the risks executives think are the biggest concern in 2026.

thumbnail
Jordan Smith

Jordan Smith is a news writer who has seven years of experience as a journalist, copywriter, podcaster, and copyeditor. He has worked with both written and audio media formats, contributing to IT publications such as MeriTalk, HCLTech, and Channel Insider, and participating in podcasts and panel moderation for IT events.

Recommended for you...

CrowdStrike’s Daniel Bernard on Nord Security Partnership
Jordan Smith
Jan 28, 2026
Cloudbrink Targets AI Security Gaps with Safe AI Expansion
Victoria Durgin
Jan 27, 2026
What the Latest Security Research Means for MSPs & Customers
Luis Millares
Jan 26, 2026
Nozomi Debuts Private OT/IoT Cybersecurity Assistant
Jordan Smith
Jan 23, 2026
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.