content/manuals/dhi/core-concepts/fips.md
{{< summary-bar feature_name="Docker Hardened Images" >}}
FIPS 140 is a U.S. government standard that defines security requirements for cryptographic modules that protect sensitive information. It is widely used in regulated environments such as government, healthcare, and financial services.
FIPS certification is managed by the NIST Cryptographic Module Validation Program (CMVP), which ensures cryptographic modules meet rigorous security standards.
FIPS 140 compliance is required or strongly recommended in many regulated environments where sensitive data must be protected, such as government, healthcare, finance, and defense. These standards ensure that cryptographic operations are performed using vetted, trusted algorithms implemented in secure modules.
Using software components that rely on validated cryptographic modules can help organizations:
While Docker Hardened Images are available to all, the FIPS variant requires a paid Docker Hardened Images subscription.
Docker Hardened Images (DHIs) include variants that use cryptographic modules validated under FIPS 140. These images are intended to help organizations meet compliance requirements by incorporating components that meet the standard.
[!NOTE]
Using a FIPS image variant helps meet compliance requirements but does not make an application or system fully compliant. Compliance depends on how the image is integrated and used within the broader system.
Docker Hardened Images that support FIPS are marked as FIPS compliant in the Docker Hardened Images catalog.
To find DHI repositories with FIPS image variants, explore images and:
These indicators help you quickly locate repositories that support FIPS-based
compliance needs. Image variants that include FIPS support will have a tag
ending with -fips, such as 3.13-fips.
To use a FIPS variant, you must mirror the repository and then pull the FIPS image from your mirrored repository.
The FIPS variants of Docker Hardened Images contain a FIPS attestation that lists the actual cryptographic modules included in the image.
You can retrieve and inspect the FIPS attestation using the Docker Scout CLI:
$ docker scout attest get \
--predicate-type https://docker.com/dhi/fips/v0.1 \
--predicate \
dhi.io/<image>:<tag>
For example:
$ docker scout attest get \
--predicate-type https://docker.com/dhi/fips/v0.1 \
--predicate \
dhi.io/python:3.13-fips
The attestation output is a JSON array describing the cryptographic modules included in the image and their compliance status. For example:
[
{
"certification": "CMVP #4985",
"certificationUrl": "https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4985",
"name": "OpenSSL FIPS Provider",
"package": "pkg:dhi/[email protected]",
"standard": "FIPS 140-3",
"status": "active",
"sunsetDate": "2030-03-10",
"version": "3.1.2"
}
]