Explore Docker Hardened Images
Docker Hardened Images (DHI) are a curated set of secure, production-ready container images designed for enterprise use. This page explains how to explore available DHI repositories, review image metadata, examine variant details, and understand the security attestations provided. Use this information to evaluate and select the right image variants for your applications before mirroring them to your organization.
Access Docker Hardened Images
Docker Hardened Images requires a subscription. Sign up to access Docker Hardened Images.
Explore Docker Hardened Images
To explore Docker Hardened Images (DHI):
- Go to Docker Hub and sign in.
- Select My Hub.
- In the namespace drop-down, select your organization that has access to DHI.
- Select DHI catalog.
On the DHI page, you can browse images, search images, or filter images by category.
View repository details
To view repository details:
- Go to Docker Hub and sign in.
- Select My Hub.
- In the namespace drop-down, select your organization that has access to DHI.
- Select DHI catalog.
- Select a repository in the DHI catalog list.
The repository details page provides the following:
- Overview: A brief explanation of the image.
- Guides: Several guides on how to use the image and migrate your existing application.
- Tags: Select this option to view image variants.
- Security summary: Select a tag name to view a quick security summary, including package count, total known vulnerabilities, and Scout health score.
- Recently pushed tags: A list of recently updated image variants and when they were last updated.
- Mirror to repository: Select this option to mirror the image to your organization's repository in order to use it. Only organization owners can mirror a repository.
- View in repository: After a repository has been mirrored, you can select this option to view where the repository has been mirrored, or mirror it to another repository.
View image variants
Tags are used to identify image variants. Image variants are different builds of the same application or framework tailored for different use-cases.
To explore image variants:
- Go to Docker Hub and sign in.
- Select My Hub.
- In the namespace drop-down, select your organization that has access to DHI.
- Select DHI catalog.
- Select a repository in the DHI catalog list.
- Select Tags.
The Tags page provides the following information:
- Tags: A list of all available tags, also known as image variants.
- Distribution: The distribution that the variant is based on. For example,
debian 12
oralpine 3.21
. - Package manager: The package manager that is available in the variant. For example,
apt
,apk
, or-
(no package manager). - Shell: The shell that is available in the variant. For example,
bash
,busybox
, or-
(no shell). - User: The user that the container runs as. For example,
root
,nonroot (65532)
, ornode (1000)
. - Last pushed: The amount of days ago that the image variant was last pushed.
- Vulnerabilities: The amount of vulnerabilities in the variant based on the severity.
- Health: The Scout health score for the variant. Select the score icon to get more details.
NoteUnlike most images on Docker Hub, Docker Hardened Images do not use the
latest
tag. Each image variant is published with a full semantic version tag (for example,3.13
,3.13-dev
) and is kept up to date. If you need to pin to a specific image release for reproducibility, you can reference the image by its digest.
View image variant details
To explore the details of an image variant:
- Go to Docker Hub and sign in.
- Select My Hub.
- In the namespace drop-down, select your organization that has access to DHI.
- Select DHI catalog.
- Select a repository in the DHI catalog list.
- Select Tags.
- Select the image variant's tag in the table.
The image variant details page provides the following information:
- Packages: A list of all packages included in the image variant. This section includes details about each package, including its name, version, distribution, and licensing information.
- Specifications: The specifications for the image variant include the following
key details:
- Source & Build Information: The image is built from the Dockerfile found here and the Git commit.
- Build parameters
- Entrypoint
- CMD
- User
- Working directory
- Environment Variables
- Labels
- Platform
- Vulnerabilities: The vulnerabilities section provides a list of known CVEs for
the image variant, including:
- CVE
- Severity
- Package
- Fix version
- Last detected
- Status
- Suppressed CVEs
- Attestations: Variants include comprehensive security attestations to verify the image's build process, contents, and security posture. These attestations are signed and can be verified using cosign. For a list of available attestations, see Attestations.
What's next
After finding an image you need, you can mirror the image to your organization. If the image is already mirrored, then you can start using the image.