{"id":2338,"date":"2025-08-06T14:19:15","date_gmt":"2025-08-06T14:19:15","guid":{"rendered":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/2025\/08\/06\/the-next-evolution-of-docker-hardened-images-customizable-fedramp-ready-ai-migration-agent-and-deeper-integrations\/"},"modified":"2025-08-06T14:19:15","modified_gmt":"2025-08-06T14:19:15","slug":"the-next-evolution-of-docker-hardened-images-customizable-fedramp-ready-ai-migration-agent-and-deeper-integrations","status":"publish","type":"post","link":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/2025\/08\/06\/the-next-evolution-of-docker-hardened-images-customizable-fedramp-ready-ai-migration-agent-and-deeper-integrations\/","title":{"rendered":"The Next Evolution of Docker Hardened Images: Customizable, FedRAMP Ready, AI Migration Agent, and Deeper Integrations"},"content":{"rendered":"<p>We <a href=\"https:\/\/www.docker.com\/blog\/introducing-docker-hardened-images\/\">launched<\/a> <strong>Docker Hardened Images (DHI)<\/strong> in <strong>May<\/strong>, and in just two and a half months, adoption has accelerated rapidly across industries. From nimble startups to global enterprises, organizations are turning to DHI to achieve near-zero CVEs, shrink their attack surface, and harden their software supply chain, all without slowing down developers.<\/p>\n\n<p>In a short time, DHI has become the trusted foundation for production workloads: minimal, signed, continuously patched, and built from the ground up to deliver security at scale. Platform and security teams alike are moving faster and more securely than ever before.<\/p>\n\n<p>That momentum is why we\u2019re doubling down. We\u2019re expanding Docker Hardened Images with powerful new capabilities: a broader image catalog, flexible customization options, AI migration agent, FedRAMP-ready variants, and tighter integrations with the tools teams already use every day. Many of these enhancements will be in action at Black Hat 2025.<\/p>\n\n<div class=\"wp-block-ponyo-video\">\n<div><\/div>\n<\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Secure Images for End-to-End Workloads<\/strong><\/h2>\n<p>One of the most consistent things we hear from customers, especially those in security-conscious environments, is that they\u2019re not just running a few basic containers. They\u2019re deploying <strong>full-stack systems<\/strong> that span everything from message queues like RabbitMQ and Redis, to web servers like Tomcat and NGINX, databases and storage tools such as PostgreSQL and Prometheus, and developer tools like Azure Functions and Grafana. They also rely on networking components like Envoy, monitoring and observability stacks like Grafana, Loki, and Netdata, and even ML and AI infrastructure like Kubeflow.\u00a0<\/p>\n\n<p>To support these real-world workloads, the Docker Hardened Images (DHI) catalog now includes trusted, production-ready images across all these categories. Every image is SLSA-compliant, signed, and continuously maintained, giving security teams confidence that they\u2019re using secure, verifiable containers without slowing down developers or complicating compliance.<\/p>\n<p>And now, getting started with DHI is even easier. Docker\u2019s <a href=\"https:\/\/docs.docker.com\/ai\/gordon\/\" target=\"_blank\">AI assistant<\/a> can automatically analyze your existing containers and recommend or apply equivalent hardened images, streamlining your move from community or internal images. Watch it in action below.<\/p>\n\n<div class=\"wp-block-ponyo-image\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>DHI Customization: Flexibility without the risk<\/strong><\/h2>\n<p>Another piece of feedback we\u2019ve heard from customers is how much they appreciate the flexibility of DHI. DHI meets teams where they are, allowing them to customize based on their unique needs rather than forcing them to adapt to rigid constraints. The ability to tailor images while still relying on a hardened, security-first foundation has been a clear win. And now, we\u2019ve taken that experience even further.<\/p>\n\n<p>With our new <strong>self-serve UI<\/strong>, customizing DHI is faster and simpler than ever. You can inject internal certificates, install trusted packages, tweak runtime settings, and define user policies, all without forking base images or wrangling complex workarounds.<\/p>\n\n<p>Need to configure runtimes, install essential tools like curl, git, or debugging utilities? Want to add custom CA certificates for internal trust chains, set environment variables, or define custom users and groups? With DHI, you can do it all in just a few clicks.<\/p>\n\n<p>Best of all, your custom images stay secure automatically. Customizations are packaged as OCI artifacts: secure, versioned layers that cleanly separate your logic from the base image. Docker handles the final image build, signs it while maintaining a SLSA Build Level 3 standard, and ensures the image is always up to date.<\/p>\n<p>When the base image receives a security patch or your own artifacts are updated, Docker automatically <strong>rebuilds your customized images<\/strong> in the background. No manual work. No surprise drift. Just continuous compliance and protection by default. Customers can create as many customizations as they need for each repository, without any additional cost.\u00a0<\/p>\n\n<p>This is a huge win for platform and security teams. There\u2019s no need to fork base images, write custom CI rebuild scripts, or maintain parallel image pipelines just to meet security or policy requirements. You get the flexibility you need without the operational overhead.<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>FedRAMP-Ready: Built for compliance from the start<\/strong><\/h2>\n<p>If you\u2019re chasing FedRAMP authorization, meeting strict security standards like FIPS and STIG isn\u2019t optional, it\u2019s mission-critical. But hardening container images manually? That\u2019s wasted time, human error, and endless maintenance.<\/p>\n\n<p>Docker Hardened Images now ship with FedRAMP-ready variants, engineered to align out of the box with U.S. federal security requirements. These images are <strong>FIPS-enabled <\/strong>for strong, validated cryptographic enforcement, STIG-ready with secure defaults baked in, and delivered with signed SBOMs and attestations for full auditability.<\/p>\n\n<p>All of this is built and maintained by Docker so your team doesn\u2019t have to be in the business of compliance engineering. Just plug these images into your pipeline and go. Under the hood, Docker\u2019s FIPS-enabled images leverage validated cryptographic modules such as OpenSSL, Bouncy Castle, and Go. Each image includes signed attestations linked to NIST certifications and test results, ensuring transparency and traceability across the software supply chain.<\/p>\n\n<p>Every <strong>STIG-ready image<\/strong> is scanned via OpenSCAP during secure builds and comes with signed results, including compliance scores and full scan outputs (HTML and XCCDF). Each result is clearly mapped to NIST 800-53 controls, making it easier for security teams and auditors to assess and track compliance. As you customize these images, Docker helps you track compliance over time, making it easier for security teams and auditors alike.<\/p>\n\n<p>Learn how Docker is simplifying FedRAMP readiness in this <a href=\"https:\/\/www.docker.com\/blog\/fedramp-compliance\/\">deep-dive blog post<\/a><\/p>\n\n<h2 class=\"wp-block-heading\"><strong>Docker + Wiz: Smarter Vulnerability Management<\/strong><\/h2>\n<p>Docker Hardened Images integrate seamlessly into your existing developer and security workflows, working out of the box with popular tools like GitLab, Sonatype, CloudSmith, Docker Hub, Docker Desktop, GitHub Actions, Jenkins, and more.<\/p>\n\n<p>Now, we\u2019re taking it a step further: Docker Hardened Images integrate with <strong>Wiz<\/strong>, empowering security teams with deeper, context-rich visibility into real risk based on what\u2019s running in production, what\u2019s exposed to the internet, and what interacts with sensitive data.<\/p>\n\n<p>\u201cDocker\u2019s Hardened Images offer an exceptionally secure foundation with significantly smaller surface areas and near-zero CVEs\u201d, said Oron Noah, VP of Product, Extensibility &amp; Partnerships at Wiz. \u201cThe integration between Docker and Wiz empowers DevSecOps teams to operationalize these trusted foundations with complete visibility into container image technologies and precise vulnerability reporting. Rich OpenVEX documents and OSV advisories provided by Docker add context to vulnerabilities reported in Wiz, enabling teams to prioritize the vulnerabilities that matter and remediate faster without slowing down innovation. This integration gives platform and security teams both a secure foundation and a platform to monitor and manage the full container security lifecycle from code to runtime.\u201d<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>Putting DHI to the Test: Independent Security Assessment<\/strong><\/h2>\n<p>To validate the security posture of Docker Hardened Images, we partnered with <strong>Security Research Labs (SRLabs)<\/strong>, a leading cybersecurity firm, to conduct an independent assessment. Their review included threat modeling, architectural analysis, and grey-box testing using publicly available artifacts, simulating realistic attack scenarios.<\/p>\n\n<p>The results reaffirmed our approach. SRLabs verified that all sampled Docker Hardened Images are cryptographically signed, rootless by default, and ship with both SBOM and VEX metadata, a critical combination for modern software supply chain security.\u00a0<\/p>\n\n<p>Importantly, no root escapes or high-severity breakouts were found during the assessment period. SRLabs also validated Docker\u2019s claim of removing common shells and package managers, significantly reducing the attack surface up to <strong>95% smaller <\/strong>than standard images. <strong>7-day patch <\/strong>SLA and build-to-sign pipeline were identified as a strength compared to typical community images. The review also acknowledged areas for improvement such as key revocation and build determinism which are already being actively addressed.<\/p>\n\n<p>Read more about the SRLabs report <a href=\"https:\/\/www.docker.com\/resources\/what-makes-a-container-secure\/\">here<\/a>.\u00a0<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>The Future of Hardened Containers Starts Here<\/strong><\/h2>\n<p>Docker Hardened Images are becoming the trusted foundation for building and running secure apps at scale. With a broad catalog, easy customization, FedRAMP-ready variants, and integrations like Wiz, DHI meets teams where they are. Best of all, customization, FIPS, and STIGs are included at no extra cost, simplifying compliance without compromise.<\/p>\n\n<p>If you\u2019re attending Black Hat 2025, we\u2019d love to connect. Please come visit Docker at Booth #5315 to explore how we\u2019re redefining software supply chain security. And don\u2019t miss our session, \u201cAchieving End-to-End Software Supply Chain Security\u201d, happening on Wednesday, August 6 from 12:05 to 1:30 PM in Lagoon CD, Level 2. We\u2019ll be diving deep into real-world strategies for implementing hardened, traceable, and continuously compliant software delivery pipelines.<\/p>","protected":false},"excerpt":{"rendered":"<p>We launched Docker Hardened Images (DHI) in May, and in just two and a half months, adoption has accelerated rapidly [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4],"tags":[],"class_list":["post-2338","post","type-post","status-publish","format-standard","hentry","category-docker"],"_links":{"self":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts\/2338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/comments?post=2338"}],"version-history":[{"count":0,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts\/2338\/revisions"}],"wp:attachment":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/media?parent=2338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/categories?post=2338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/tags?post=2338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}