If you want to see how this looks in practice, BellSoft Hardened Images are here, including whatโs covered and the available variants: bell-sw.com/bellsoft-har...
19.02.2026 17:00 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0@bellsoft.bsky.social
Delivering #LibericaJDK: supported, #Java standard compatible binaries. Among Top-5 #OpenJDK contributors.
If you want to see how this looks in practice, BellSoft Hardened Images are here, including whatโs covered and the available variants: bell-sw.com/bellsoft-har...
19.02.2026 17:00 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0Thatโs how BellSoft Hardened Images are built: each image ships with a complete SBOM, and image signing lets you verify integrity and authenticity across registries, so โwhatโs insideโ and โis it the right artifactโ are answered by default, not on request.
19.02.2026 17:00 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0Once you start treating SBOMs and signing as routine parts of the pipeline, the next step is having them available at the base image level, not stitched on later.
19.02.2026 17:00 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0๐ For the practical side, weโve also published a step-by-step guide to generating SBOMs for Java artifacts and container images using common open-source tooling, with concrete Maven/Gradle workflows you can plug into CI: bell-sw.com/blog/how-to-...
19.02.2026 17:00 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0๐ If you need a clear SBOM baseline, this walkthrough covers what an SBOM is, what it typically includes (component names/versions, suppliers, dependency relationships), and how teams use it for vulnerability and compliance work: bell-sw.com/blog/what-is...
19.02.2026 17:00 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0Together, SBOMs and signing remove a lot of friction in incident response and audits. When someone asks โwhatโs runningโ and โwhere did it come from,โ you can answer with data and verification, not screenshots from a scanner or a reconstruction from CI logs.
19.02.2026 17:00 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0Image signing answers the second question: is this the exact image we meant to deploy? Instead of trusting tags and copy/paste, you verify integrity and provenance cryptographically, which matters most when artifacts move across registries and environments.
19.02.2026 17:00 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0SBOMs answer the first question: whatโs inside this image? A Dockerfile and a tag rarely tell the full story once images get rebuilt, mirrored, or retagged, so an SBOM gives you a stable, machine-readable inventory of what is being shipped.
19.02.2026 17:00 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0๐งต THREAD: SBOMs and image signing often get treated like โcompliance paperwork.โ In practice, they solve two very operational problems: knowing whatโs inside an image, and proving that the image you deploy is the image you intended to deploy.
19.02.2026 17:00 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0In #Java26, JEP 500 makes โfinalโ more final. Reflective writes to final fields warn by default (--illegal-final-field-mutation=warn), can be allowed (--enable-final-field-mutation), or denied (--illegal-final-field-mutation=deny). Hacks still work, but cleanup is coming. Repro ๐
18.02.2026 15:09 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0Happy Lunar New Year to everyone celebrating today.
ๆฐๅนดๅฟซไน! ็ฅๅคงๅฎถๆฐ็ไธๅนด้ฉฌๅฐๆๅ ๐งง
Berlin: @asm0dey.site is hosting Spring User Group Berlin this Thu (Feb 19).
K8s Secrets in Spring, the production way (env vars vs files, rotation) + Kotlin for Spring 7 (pros/cons).
18:30 CET. RSVP: www.meetup.com/spring-user-...
Platform adoption can fail even when the tech is fine. Mandates create โusage,โ then teams build workarounds to keep shipping. You pay the platform cost and you still inherit the extra tech debt. Good breakdown here on what changes the outcome: platformengineering.com/features/why...
15.02.2026 13:13 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0Weโre live now with @dashaun.com and @cat-edelveis.bsky.social. Real talk on container security from the Devoxx 2025 survey. Join here: www.youtube.com/watch?v=Sqmx...
13.02.2026 14:31 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0Your container security strategy might be setting you up for failure and you won't know until it matters.
โก Live TODAY 09:30 ET: @dashaun.com & @cat-edelveis.bsky.social break down the 2025 State of Container Security survey from Devoxx: www.youtube.com/watch?v=Sqmx...
Spring Data MongoDB takes the best of MongoDB and Spring Data. @cat-edelveis.bsky.social covers indexing, projections, custom queries, and aggregation pipelines. Real queries, actual data volumes, analytics. Practical patterns for production use: youtu.be/LCHMQk_uAv4
12.02.2026 15:53 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0Most Java security incidents are predictable engineering debt: vulnerable deps, weak boundaries, and no visibility when things break. We wrote a practical #Java app security checklist that covers code, runtime, and containers: bell-sw.com/blog/a-guide...
09.02.2026 12:45 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0In the upcoming #Java26, lazy constants get their second preview (JEP 526). java.lang.LazyConstant lets the app initialize them on demand with at-most-once semantics even under concurrency. Once initialized, the JVM can treat the value as a true constant and apply constant folding.๐
06.02.2026 16:14 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0Onboarding a new team taking weeks instead of hours is usually a symptom, not the problem itself. This article explains how ad-hoc DevOps practices stop working at scale, and where platform engineering really helps: platformengineering.com/social-faceb...
04.02.2026 14:17 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0More on BellSoft Hardened Images, including the remediation SLA, SBOM/signing, and available variants: bell-sw.com/bellsoft-har...
03.02.2026 12:45 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0You also get SBOM coverage, image signing, and a remediation SLA (7 days for critical, 14 days for others), so โwhatโs the plan?โ has a concrete answer.
03.02.2026 12:45 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0BellSoft Hardened Images are built around that lifecycle idea. We start with minimized images, keep the component set immutable (no package manager), and run continuous CVE monitoring with rebuilds when fixes land.
03.02.2026 12:45 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0To make this sustainable, the baseline image has to be treated like a maintained deliverable: fewer moving parts, controlled drift, and a predictable remediation loop when CVEs appear. Without that, hardening stays a snapshot and ops pays the bill.
03.02.2026 12:45 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0Every bounce costs time, so the only sustainable model is lifecycle-based: minimize the surface, lock the config to prevent drift, and keep rebuilds and fixes running as part of the release process.
03.02.2026 12:45 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0The gap usually appears during remediation. A scanner flags an OS or runtime CVE, and responsibility starts bouncing between internal teams.
03.02.2026 12:45 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0Minimization helps, but itโs primarily a baseline improvement. Fewer packages means fewer caveats and fewer moving parts for inventory. Risk still stays open unless you have a reliable post-discovery workflow: clear ownership, predictable fixes, and repeatable rebuilds.
03.02.2026 12:45 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0The mistake is treating โhardeningโ as a one-time step. You shrink the image today, but new vulnerabilities are discovered, CVE records get updated, and what looked โclean enoughโ yesterday can look worse in the next scan without you changing a byte.
03.02.2026 12:45 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0This isnโt only a security-team concern. In Red Hatโs 2024 Kubernetes security survey, two-thirds of respondents said Kubernetes security concerns delayed or slowed deployments, and almost half reported adverse effects from container security and compliance incidents.
www.redhat.com/en/resources...
In its container risk research, NetRise reports 600+ known vulnerabilities in an average container image. It also highlights that some vulnerabilities are over five years old, and that a subset of critical/high issues are already weaponized and actively exploited.
www.techmonitor.ai/technology/c...
๐งต Thread: CVEs in container images donโt โendโ just because you cleaned up an image once. If you run containers in prod, save this for later.
03.02.2026 12:45 โ ๐ 1 ๐ 1 ๐ฌ 1 ๐ 0