{"id":2035,"date":"2025-05-19T13:16:27","date_gmt":"2025-05-19T13:16:27","guid":{"rendered":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/2025\/05\/19\/introducing-docker-hardened-images-secure-minimal-and-ready-for-production\/"},"modified":"2025-05-19T13:16:27","modified_gmt":"2025-05-19T13:16:27","slug":"introducing-docker-hardened-images-secure-minimal-and-ready-for-production","status":"publish","type":"post","link":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/2025\/05\/19\/introducing-docker-hardened-images-secure-minimal-and-ready-for-production\/","title":{"rendered":"Introducing Docker Hardened Images: Secure, Minimal, and Ready for Production"},"content":{"rendered":"<p>From the start, Docker has focused on enabling developers to build, share, and run software efficiently and securely. Today, Docker Hub powers software delivery at a global scale, with over 14 million images and more than 11 billion pulls each month. That scale gives us a unique vantage point into how modern software is built and the challenges teams face in securing it.<\/p>\n\n<p>That\u2019s why we\u2019ve made security a cornerstone of our platform. From trusted Docker Official Images to SBOM support for transparency, the launch of Docker Scout for real-time vulnerability insights, and a hardened Docker Desktop to secure local development, every investment reflects our commitment to making software supply chain security more accessible, actionable, and developer-first.<\/p>\n\n<p>Now, we\u2019re taking that commitment even further.<\/p>\n\n<p>We\u2019re excited to introduce <a href=\"https:\/\/www.docker.com\/products\/hardened-images\/\">Docker Hardened Images<\/a> (DHI) \u2014 secure-by-default container images purpose-built for modern production environments.<\/p>\n<p>These images go far beyond being just slim or minimal. Docker Hardened Images start with a dramatically reduced attack surface, up to 95% smaller, to limit exposure from the outset. Each image is curated and maintained by Docker, kept continuously up to date to ensure near-zero known CVEs. They support widely adopted distros like Alpine and Debian, so teams can integrate them without retooling or compromising compatibility.<\/p>\n\n<p>Plus, they\u2019re designed to work seamlessly with the tools you already depend on. We\u2019ve partnered with a range of leading security and DevOps platforms, including Microsoft, NGINX, Sonatype, GitLab, Wiz, Grype, Neo4j, JFrog, Sysdig and Cloudsmith, to ensure seamless integration with scanning tools, registries, and CI\/CD pipelines.<\/p>\n<div class=\"wp-block-embed__wrapper\">\n<\/div>\n<p><\/p>\n<p><\/p>\n<h2 class=\"wp-block-heading\">What we\u2019re hearing from customers<\/h2>\n<p><\/p>\n<p><\/p>\n<p>We talk to teams every day, from fast-moving startups to global enterprises, and the same themes keep coming up.<\/p>\n<p><\/p>\n<p><\/p>\n<p>Integrity is a growing concern: \u201cHow do we know every component in our software is exactly what it claims to be\u2014and hasn\u2019t been tampered with?\u201d With so many dependencies, it\u2019s getting harder to answer that with confidence.<\/p>\n<p><\/p>\n<p><\/p>\n<p>Then there\u2019s the attack surface problem. Most teams start with general-purpose base images like Ubuntu or Alpine. But over time, these containers get bloated with unnecessary packages and outdated software, creating more ways in for attackers.<\/p>\n<p><\/p>\n<p><\/p>\n<p>And of course, operational overhead is through the roof. Security teams are flooded with CVEs. Developers are stuck in a loop of patching and re-patching, instead of shipping new features. We\u2019re hearing about vulnerability scanners lighting up constantly, platform teams stretched thin by centralized dependencies, and developers resorting to manual upgrades just to stay afloat. These challenges aren\u2019t isolated \u2014 they\u2019re systemic. And they\u2019re exactly what we designed Docker Hardened Images to address.<\/p>\n<p><\/p>\n<p><\/p>\n<h2 class=\"wp-block-heading\">Inside Docker Hardened Images<\/h2>\n<p><\/p>\n<p><\/p>\n<p>Docker Hardened Images aren\u2019t just trimmed-down versions of existing containers \u2014 they\u2019re built from the ground up with security, efficiency, and real-world usability in mind. They\u2019re designed to meet teams where they are. Here\u2019s how they deliver value across three essential areas:<\/p>\n<p><\/p>\n<p><\/p>\n<h3 class=\"wp-block-heading\">Seamless Migration<\/h3>\n<p><\/p>\n<p><\/p>\n<p>First, they integrate seamlessly into existing workflows. Unlike other minimal or \u201csecure\u201d images that force teams to change base OSes, rewrite Dockerfiles, or abandon tooling, DHI supports the distributions developers already use, including familiar Debian and Alpine variants. In fact, upgrading to a DHI can be simple. Switching to a hardened image is as simple as updating one line in your Dockerfile:<\/p>\n<p><\/p>\n<p><\/p>\n<p><\/p>\n<h3 class=\"wp-block-heading\">Flexible customization<\/h3>\n<p><\/p>\n<p><\/p>\n<p>Second, they strike the right balance between security and flexibility. Security shouldn\u2019t mean sacrificing usability. DHI supports the customizations teams rely on, including certificates, packages, scripts, and configuration files, without compromising the hardened foundation. You get the security posture you need with the flexibility to tailor images to your environment.<\/p>\n<p><\/p>\n<p><\/p>\n<p><\/p>\n<p><\/p>\n<p><\/p>\n<p>Under the hood, Docker Hardened Images follow a distroless philosophy, stripping away unnecessary components like shells, package managers, and debugging tools that commonly introduce risk. While these extras might be helpful during development, they significantly expand the attack surface in production, slow down startup times, and complicate security management.<\/p>\n<p><\/p>\n<p><\/p>\n<p>By including only the essential runtime dependencies needed to run your application, DHI delivers leaner, faster containers that are easier to secure and maintain. This focused, minimal design leads to up to a 95% reduction in attack surface, giving teams a dramatically stronger security posture right out of the box.<\/p>\n<p><\/p>\n<p><\/p>\n<h3 class=\"wp-block-heading\">Automated Patching &amp; Rapid CVE Response<\/h3>\n<p><\/p>\n<p><\/p>\n<p>Finally, patching and updates are continuous and automated. Docker monitors upstream sources, OS packages, and CVEs across all dependencies. When updates are released, DHI images are rebuilt, subjected to extensive testing, and published with fresh attestations\u2014ensuring integrity and compliance within our SLSA Build Level 3\u2013compliant build system. The result: you\u2019re always running the most secure, verified version\u2014no manual intervention required.<\/p>\n<p><\/p>\n<p><\/p>\n<p>Most importantly, when essential components are built directly from source, allowing us to deliver critical patches faster and remediate vulnerabilities promptly. We patch Critical and High-severity CVEs within 7 days \u2014 faster than typical industry response times \u2014and back it all with an enterprise-grade SLA for added peace of mind.<\/p>\n<p><\/p>\n<p><\/p>\n<h2 class=\"wp-block-heading\">Internal Adoption: Validating Docker Hardened Images in Production Environments<\/h2>\n<p><\/p>\n<p><\/p>\n<p>We\u2019ve been using DHI internally across several key projects \u2014 putting them to the test in real-world, production environments. One standout example is our internal use of a hardened Node image.\u00a0<\/p>\n<p><\/p>\n<p><\/p>\n<p>By replacing the standard Node base image with a Docker Hardened Image, we saw immediate and measurable results: vulnerabilities dropped to zero, and the package count was reduced by over 98%.\u00a0<\/p>\n<p><\/p>\n<p><\/p>\n<p>That reduction in packages isn\u2019t just a matter of image size, it directly translates to a smaller attack surface, fewer moving parts to manage, and significantly less overhead for our security and platform teams. This shift gave us a stronger security posture and simplified operational complexity \u2014 exactly the kind of outcome we designed DHI to deliver.<\/p>\n<p><\/p>\n<p><\/p>\n<h3 class=\"wp-block-heading\">Ready to get started?<\/h3>\n<p><\/p>\n<p><\/p>\n<p>Docker Hardened Images are designed to help you ship software with confidence by dramatically reducing your attack surface, automating patching, and integrating seamlessly into your existing workflows. Developers stay focused on building. Security teams get the assurance they need.<\/p>\n<p><\/p>\n<p><\/p>\n<p>Looking to reduce your vulnerability count?<\/p>\n<p><\/p>\n<p><\/p>\n<p>We\u2019re here to help. <strong><a href=\"https:\/\/www.docker.com\/products\/hardened-images\/#getstarted\">Get in touch with us<\/a> <\/strong>and let\u2019s harden your software supply chain, together.<\/p>\n<p><\/p>\n<p><\/p>\n<p><\/p><!-- \/wp:html -->","protected":false},"excerpt":{"rendered":"<p>From the start, Docker has focused on enabling developers to build, share, and run software efficiently and securely. Today, Docker [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4],"tags":[],"class_list":["post-2035","post","type-post","status-publish","format-standard","hentry","category-docker"],"_links":{"self":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts\/2035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/comments?post=2035"}],"version-history":[{"count":0,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts\/2035\/revisions"}],"wp:attachment":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/media?parent=2035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/categories?post=2035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/tags?post=2035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}