DirectorySecurity AdvisoriesPricing
/
Sign in
Directory
jenkins-fips logoFIPS

jenkins-fips

Last changed

Request a free trial

Contact our team to test out this image for free. Please also indicate any other images you would like to evaluate.

Tags
Overview
Comparison
Provenance
Specifications
SBOM
Vulnerabilities
Advisories

A minimal, Wolfi-based container image for Jenkins - an open-source CI/CD server that enables developers to build, test, and deploy their software.

Download this Image

The image is available on cgr.dev:

docker pull cgr.dev/chainguard/jenkins-fips:latest

Use It

The following example runs a local instance of Jenkins, specifying a local volume as the jenkins_home for data persistence:

docker run --rm -v jenkins_home:/var/jenkins_home \
  -p 8080:8080 -it \
  cgr.dev/chainguard/jenkins:latest

In the console output, the initial admin password will be logged. Use this to login to the Jenkins UI:

  • http://localhost:8080/

Refer to the upstream documentation for full instructions on running and configuring Jenkins.

FIPS Mode

To run Jenkins in FIPS enabled mode, this image runs with the -Djenkins.security.FIPS140.COMPLIANCE=true property set. This variable must be set to true to inform Jenkins that it should attempt to use compliant algorithms only. However the Jenkins FIPS-140 documentation notes that if "any code from the JVM, servlet container, Jenkins, or any plugin requests a non-compliant algorithm, this will still be the case, and the request may be honoured."

Also note that if you are providing JAVA_OPTS via environment variables, you will need to include the -Djenkins.security.FIPS140.COMPLIANCE=true property since user supplied options will override the image's defaults.

To check that Jenkins is running with FIPS enabled, you can run the following Groovy script via the script console:

import jenkins.security.FIPS140
println (new FIPS140().useCompliantAlgorithms())

The result will be true if Jenkins is configured to use FIPS, and false if it is not.

Licenses

Chainguard's container images contain software packages that are direct or transitive dependencies. The following licenses were found in the "latest" tag of this image:

  • Apache-2.0

For a complete list of licenses, please refer to this Image's SBOM.

Software license agreement

Compliance

Chainguard Containers are SLSA Level 3 compliant with detailed metadata and documentation about how it was built. We generate build provenance and a Software Bill of Materials (SBOM) for each release, with complete visibility into the software supply chain.

SLSA compliance at Chainguard

This image helps reduce time and effort in establishing PCI DSS 4.0 compliance with low-to-no CVEs.

PCI DSS at Chainguard

This is a FIPS validated image for FedRAMP compliance.

This image is STIG hardened and scanned against the DISA General Purpose Operating System SRG with reports available.

Learn more about STIGsGet started with STIGs

Related images
jenkins logo
jenkins

Category
FIPS
STIG

The trusted source for open source

Talk to an expert
© 2025 Chainguard. All Rights Reserved.
PrivacyTerms

Product

Chainguard ContainersChainguard LibrariesChainguard VMsIntegrationsPricing