Hardened, secure images

Docker Hardened Images (DHI) are engineered to provide a robust security foundation for containerized applications, addressing the evolving challenges of software supply chain security.

Near-zero vulnerabilities and non-root execution

Each DHI is meticulously built to eliminate known vulnerabilities, achieving near-zero Common Vulnerabilities and Exposures (CVEs) through continuous scanning and updates. By adhering to the principle of least privilege, DHI images run as non-root by default, reducing the risk of privilege escalation attacks in production environments.

Comprehensive supply chain security

DHI incorporates multiple layers of security metadata to ensure transparency and trust:

  • SLSA Level 3 compliance: Each image includes detailed build provenance, meeting the standards set by the Supply-chain Levels for Software Artifacts (SLSA) framework.

  • Software Bill of Materials (SBOMs): Comprehensive SBOMs are provided, detailing all components within the image to facilitate vulnerability management and compliance audits.

  • Vulnerability Exploitability eXchange (VEX) statements: VEX documents accompany each image, providing context about known vulnerabilities and their exploitability status.

  • Cryptographic signing and attestations: All images and associated metadata are cryptographically signed, ensuring integrity and authenticity.

Minimal and developer-friendly options

DHI provides both minimal and development-friendly image variants:

  • Minimal images: Built using a distroless approach, these images remove unnecessary components, reducing the attack surface by up to 95% and improving startup times.

  • Development images: Equipped with essential development tools and libraries, these images facilitate secure application building and testing.