Best container security strategies for image freshness in 2026?
we scan all our running containers weekly. most come back clean, no critical CVEs.
but some of those images haven't been rebuilt in six months. the scanner does catch new CVEs in old images Trivy and Grype pull from a continuously updated vulnerability database, so a CVE published last week will show up against a six-month-old image in this week's scan. detection isn't the problem.
the problem is remediation. scanner fires, ticket opens, nobody rebuilds because the service hasn't changed and devs don't want to touch something stable. so the CVE sits open, aging, with no clear owner pushing the rebuild.
security wants a policy: "no image older than 30 days in prod." devs say that's impossible because some services genuinely don't change that often and a forced rebuild just to rotate the base image breaks their release process.
what we need is a way to rebase on a patched base image without triggering a full app rebuild and re-test cycle every month. right now those are coupled and neither side wants to own the cost.
how are you enforcing image freshness without forcing useless rebuilds?