Container Security
Built for Compliance
ACTA is a self-hosted container security platform that maps every finding to DISA controls, CCI identifiers, and NIST frameworks — giving compliance teams exactly what they need for Authority to Operate.
General-purpose scanners weren't built for regulated environments
Tools like Trivy, Grype, and Snyk find vulnerabilities — but they stop there. Compliance teams still have to manually map findings to DISA controls, build POA&M spreadsheets, generate STIG checklists, and assemble ATO evidence packages. That manual translation layer is where timelines slip, audits stall, and risk gets lost in spreadsheets.
ACTA closes that gap. It scans the same artifacts, then carries every finding through to the compliance deliverables your ISSM actually needs.
What ACTA Does
Six integrated modules. One scan pipeline. Every artifact your ISSM needs.
Composable Policy Engine
YAML-based, auditable, and designed for real-world compliance workflows. Policies define rules with configurable thresholds, actions, and per-environment overrides — so the same policy can FAIL in production and WARN in development.
Built-in Compliance Packs
Pre-built policy packs aligned to major frameworks. Combine multiple packs per scan.
| Pack | Description |
|---|---|
| DISA CIC | Container Image Creation requirements (8 rules) |
| DISA CDE | Container Deployment Environment requirements (6 rules) |
| Vulnerability Gates | Severity threshold enforcement (5 rules) |
| Iron Bank Pipeline | Iron Bank container hardening (7 rules) |
| Procurement Validation | OMB M-22-18 procurement compliance (5 rules) |
| NIST 800-53 | Control family mapping (7 rules) |
| NIST 800-190 | Container-specific security (7 rules) |
| FedRAMP High | FedRAMP High baseline thresholds (4 rules) |
Environment Overrides
Rules behave differently per deployment target. A critical vulnerability can block production deploys while only warning in development — same policy file, no duplication.
Waivers with Accountability
Temporarily exempt specific CVEs with tracked, expiring waivers tied to ticket numbers. Blast radius analysis shows what a waiver covers. Expiration alerts prevent waivers from going stale. Simulate revoking a waiver before you do it.
Policy Management Tools
Diff two policies before deploying changes. Validate syntax and semantics. Dry-run against historical scans. Generate human-readable explanations of what a policy enforces.
Direct DISA Control Mapping
Every check maps to a specific control from the DISA Container Image Creation and Deployment Guide (V2 R0.6), with CCI identifiers for traceability.
| Check | DISA Control | CCI | What It Enforces |
|---|---|---|---|
| SSH disabled | CM-7a | CCI-000381 | No SSH daemon in container |
| Non-root user | AC-6(10) | CCI-002235 | Must not run as root |
| COPY over ADD | CM-7a | CCI-000381 | Use COPY instead of ADD |
| Non-privileged ports | CM-7(1)(b) | CCI-001762 | Ports above 1024 only |
| HEALTHCHECK required | SC-5 | CCI-002385 | Process health monitoring |
| No embedded secrets | CM-6b | CCI-000366 | No credentials in image layers |
| Approved base image | SC-8(2) | CCI-003782 | DoD-approved registry only |
| Resource limits | SC-5(1) | CCI-002386 | CPU and memory limits set |
| Read-only root FS | CM-5(1) | CCI-001813 | Immutable root filesystem |
| Liveness probe | SC-5 | CCI-002385 | Kubernetes liveness check |
| Readiness probe | SC-5 | CCI-002385 | Kubernetes readiness check |
| No host namespaces | SC-4 | CCI-001090 | No hostPID or hostNetwork |
Reports That Go Where You Need Them
ACTA produces outputs in formats that integrate directly into your existing toolchain — from CI/CD dashboards to compliance management systems.
Human-readable summary
CLIQuick review and terminal output
GitLab SAST JSON
JSONGitLab Security Dashboard integration
SARIF
JSONGitHub Code Scanning and VS Code
CycloneDX 1.5 VDR
XML/JSONVulnerability disclosure reporting
SPDX 2.3
JSON/TAGSoftware supply chain compliance
CSV
CSVSpreadsheet analysis and stakeholder sharing
OpenVEX
JSONVulnerability exploitability exchange
POA&M CSV
CSVeMASS import for Plan of Action & Milestones
STIG CKL XML
XMLSTIG Viewer checklist import
Native CI/CD Integration
Native support for GitLab CI and GitHub Actions with exit codes that gate your pipeline. Scans produce machine-readable reports as build artifacts. A single pipeline stage covers image scanning, Dockerfile compliance, and manifest validation.
Built for How Teams Actually Work
Scan History & Baselines
Every scan is persisted to a local SQLite database. Browse past scans, show full details, compare any two scans side-by-side, and track how your security posture changes over time. Baseline resolution is automatic — when you specify a branch, ACTA finds the most recent scan for comparison.
Embedded Dashboard
An embedded dark-themed dashboard for visual scan browsing, vulnerability trends over time, and scan-to-scan comparison. Everything is compiled into the single binary — no npm, no database server, no external dependencies. Works fully offline.
Air-Gapped Support
Offline vulnerability database and feed caches for disconnected environments. Download EPSS, KEV, and NVD feeds when connected, then scan without network access.
Procurement Validation
Evaluate vendor-supplied SBOMs against OMB M-22-18 requirements. Import external SBOMs, run vulnerability matching, assess completeness, and produce APPROVE, CONDITIONAL, or REJECT recommendations.
Threat Intelligence Feeds
Advisory source tracking, remediation SLA enforcement, FIPS readiness checking, and Iron Bank pipeline compliance validation — all driven by regularly updated feed data.
Single Binary, Full Platform
ACTA ships as a single binary with no runtime dependencies beyond the scanner engines (Syft, Grype). The command structure is organized around workflows, not implementation details.
- Scanning
Image, Dockerfile, directory, and manifest scanning with combined passes and engine selection.
- Policy
Validate, diff, test, and explain policies. List available compliance packs. Re-evaluate findings against updated policies without re-scanning.
- History
Browse, inspect, compare, and manage scan records in the local database.
- cATO
Set baselines, check posture, generate evidence packages, and gate CI/CD pipelines on continuous compliance status.
- Procurement
Validate vendor SBOMs against federal procurement requirements.
- Waivers
Impact analysis, expiration tracking, audit reports, and revocation simulation.
- SBOM
Sign, verify, and import SBOMs with HMAC-SHA256 integrity checking.
- Feeds
Update and check status of offline vulnerability and enrichment data.
- Infrastructure
REST API server, registry monitoring daemon, and Kubernetes admission controller for runtime enforcement.
Get Running in Minutes
Open Source, Apache 2.0
ACTA is open source under the Apache 2.0 license. Contributions are welcome — whether that's new policy packs, scanner engine integrations, output format support, or documentation improvements.
Stop translating scan results into compliance artifacts by hand.
Get started with ACTA and generate ATO artifacts from your first scan.
