content/manuals/dhi/core-concepts/provenance.md
Image provenance refers to metadata that traces the origin, authorship, and integrity of a container image. It answers critical questions such as:
Provenance establishes a chain of custody, helping you verify that the image you're using is the result of a trusted and verifiable build process.
Provenance is foundational to securing your software supply chain. Without it, you risk:
With reliable provenance, you gain:
Provenance also supports automated policy enforcement and is a key requirement for frameworks like SLSA (Supply-chain Levels for Software Artifacts).
Docker Hardened Images (DHIs) are designed with built-in provenance to help you adopt secure-by-default practices and meet supply chain security standards.
DHIs include attestations—machine-readable metadata that describe how, when, and where the image was built. These are generated using industry standards such as in-toto and align with SLSA provenance.
Attestations allow you to:
Each Docker Hardened Image is cryptographically signed and
stored in the registry alongside its digest. These signatures are verifiable
proofs of authenticity and are compatible with tools like cosign, Docker
Scout, and Kubernetes admission controllers.
With image signatures, you can: