Removing supply chain friction: How PeopleTec improved developer productivity with Chainguard
Security controls are often introduced with good intent, but can lead to poor outcomes.
A new scanner slows down builds. A new policy blocks deployments. A new approval step adds another ticket to the queue. Engineers adapt, but frustration grows.
At PeopleTec, we believe security should move at the speed of engineering. In our session at Chainguard Assemble 2026, I shared how we used Chainguard to reduce friction in the software supply chain while improving enterprise consistency. This post captures the key lessons. You can watch the full session recording embedded below.
The friction problem
Our platform and engineering teams support mission-driven workloads in highly regulated environments. That means strong requirements around vulnerability management, image provenance, and compliance reporting.
The challenge was not identifying risk. The challenge was managing it without slowing delivery.
Developers were spending time chasing CVEs in base images they did not control. Platform teams were enforcing policies that felt disconnected from day-to-day engineering work. Every new security requirement risked becoming another speed bump.
We asked a different question.
What if the secure path was also the fastest?
Start with early adopters
Driving adoption of any platform change starts with trust. We identified a small group of teams that were already feeling pain from manual CVE remediation and inconsistent base images. These teams were motivated to try something new.
Instead of mandating a standard, we offered a better experience. Chainguard Containers provided minimal, hardened containers with rapid CVE remediation and clear provenance. Builds became quieter. Fewer surprise vulnerabilities. Fewer late-night patch cycles. Those early adopters became advocates.
The lesson was simple. Adoption spreads through results, not policy.
Make onboarding low-friction
If switching to a new base image requires weeks of rework, most teams will postpone the effort. We focused on reducing activation energy:
Clear migration guides and reference examples
Drop-in compatible images that required minimal code changes
Automated policy checks embedded into CI
Office hours and direct feedback loops with platform engineers
The goal was to make the first Chainguard deployment feel routine, not risky. When developers saw that builds passed security checks without additional manual steps, trust increased. When they experienced fewer vulnerability tickets, momentum built.
Low friction onboarding is not about removing guardrails. It is about embedding them into the path engineers already take.
Balance autonomy with enterprise consistency
Large organizations struggle with a familiar tension. Teams want autonomy. Leadership wants consistency. We approached this as a platform design problem. Platform teams defined approved base images and supply chain standards. Developers retained control over their application code, release cadence, and feature priorities. Consistency lived in the foundation. Autonomy lived in the product layer.
Chainguard helped anchor that foundation. Images came with firm defaults around minimal packages and rapid patching. That reduced the need for teams to invent their own hardening patterns. Standardization happened because it reduced effort.
Close the feedback loop
Security initiatives often fail because feedback travels slowly.
We built tight loops between engineering and platform teams. When a Chainguard image introduced a breaking change or surfaced an unexpected issue, teams could escalate quickly. When developers identified recurring friction points, we adjusted documentation and automation. Over time, we moved from reactive ticket handling to proactive improvement. Security became a shared responsibility rather than a downstream gate.
Measuring what matters
To demonstrate value, we tracked both productivity and reliability.
On the productivity side, we looked at:
Time spent on CVE remediation
Frequency of build failures due to base image issues
Lead time from code commit to deploy
On the reliability side, we monitored vulnerability exposure windows and policy compliance rates.
The pattern was consistent. With hardened, continuously updated base images, teams spent less time triaging vulnerabilities and more time shipping features. Vulnerability backlogs shrank. Compliance reporting became simpler because the underlying artifacts were standardized.
Security improvements were visible in engineering metrics.
Practical steps to accelerate adoption
If you want to remove friction from your software supply chain, start with these principles:
Identify a motivated early adopter group and help them win.
Provide drop-in replacements that minimize migration effort.
Encode guardrails into automated processes rather than manual review.
Build visible feedback channels between developers and platform teams.
Do not lead with mandates. Lead with value. When the secure path reduces toil, engineers choose it willingly.
Standardization without slowing innovation
Many organizations fear that stronger supply chain controls will slow innovation. Our experience at PeopleTec has been the opposite.
By shifting vulnerability management and hardening into the platform layer, we removed recurring friction from application teams. Developers stopped reinventing base images. Platform teams stopped firefighting inconsistent configurations.
Enterprise consistency improved because the foundation was standardized. Developer autonomy improved because teams could focus on business logic instead of patch cycles. Security did not become lighter. It became better integrated. If you want security that moves at the speed of engineering, design your platform so that the right choice is the easiest. That is how you balance autonomy and consistency without slowing innovation.
Catch all the sessions from Assemble on-demand here.
Share this article
Related articles
- engineering
Breaking the release monolith: How OutSystems platform engineering restored trust in delivery
Maria Chec, Technical Program Manager, OutSystems, and João Brandão, Release Engineering Director, OutSystems
- engineering
Owning the boundary: Introducing the Chainguard FIPS Provider for OpenSSL 3.4.0
Dimitri John Ledkov, Senior Principal Software Engineer, and Mandy Hubbard, Senior Technical Product Marketing Manager
- engineering
FIPS-ing the Un-FIPS-able: Apache Kafka
Jamon Camisso, Senior Manager, Software Engineering
- engineering
This Shit is Hard: The complexities of fixing Python library security issues at scale
Wesley Wiedenmeier, Senior Software Engineer
- engineering
How I learned to stop worrying and love the latest tag
Adrian Mouat, Staff Developer Relations Engineer
- engineering
The tech leader’s mandate: Use engineering to accelerate sales velocity
Sam Katzen, Staff Product Marketing Manager