content/manuals/dhi/explore/build-process.md
Docker Hardened Images are built through an automated pipeline that monitors upstream sources, applies security updates, and publishes signed artifacts. This page explains the build process for both base DHI images and customized images available with DHI Select and DHI Enterprise subscriptions.
With DHI Select or DHI Enterprise subscriptions, the automated security update pipeline for both base and customized images is backed by SLA commitments, including a 7-day SLA for critical and high severity vulnerabilities. DHI Community offers a secure baseline but no guaranteed remediation timelines.
Docker Hardened Images provide transparency into how images are built through publicly available definitions and verifiable attestations.
All image definitions are publicly available in the catalog repository.
Each image definition is a declarative YAML specification that includes metadata, contents, build pipeline steps, security configurations, and runtime settings.
Every Docker Hardened Image includes a SLSA Build Level 3 attestation that provides verifiable build provenance. For details on SLSA attestations and how to verify them, see SLSA.
Builds start automatically. You don't trigger them manually. The system monitors for changes and starts builds in two scenarios:
New releases, package updates, or CVE fixes from upstream projects trigger base image rebuilds. These builds go through quality checks to ensure security and reliability.
Docker continuously monitors upstream projects for new releases, package updates, and security advisories. When changes are detected, the system automatically queues affected images for rebuild using a SLSA Build Level 3-compliant build system.
Docker uses three strategies to track updates:
In addition to explicit upstream tracking, Docker also monitors transitive dependencies. When a package update is detected (for example, a security patch for a library), Docker automatically identifies and rebuilds all images within the support window that use that package.
{{< summary-bar feature_name="Docker Hardened Images" >}}
Updates to your OCI artifact customizations trigger rebuilds of your customized images.
When you customize a DHI image with DHI Select or DHI Enterprise, your changes are packaged as OCI artifacts that layer on top of the base image. Docker monitors your artifact repositories and automatically rebuilds your customized images whenever you push updates.
The rebuild process fetches the current base image, applies your OCI artifacts, signs the result, and publishes it automatically. You don't need to manage builds or maintain CI pipelines for your customized images.
Customized images are also rebuilt automatically when the base DHI image they depend on receives updates, ensuring your images always include the latest security patches.
The following sections describe the build pipeline architecture and workflow for Docker Hardened Images based on:
Each Docker Hardened Image is built through an automated pipeline:
Docker responds quickly to critical vulnerabilities. By building essential components from source rather than waiting for packaged updates, Docker can patch critical and high severity CVEs within days of upstream fixes and publish updated images with new attestations. For DHI Enterprise subscriptions, this rapid response is backed by a 7-day SLA for critical and high severity vulnerabilities.
The following diagram shows the base image build flow:
.-------------------. .-------------------. .-------------------. .-------------------.
| Docker monitors |----->| Trigger rebuild |----->| AI guardrail |----->| Human review |
| upstream sources | | | | scans changes | | |
'-------------------' '-------------------' '-------------------' '-------------------'
|
v
.-------------------. .-------------------. .-------------------. .-------------------.
| Cascade rebuilds |<-----| Publish to |<-----| Sign & generate |<-----| Testing |
| (if needed) | | DHI registry | | attestations | | |
'-------------------' '-------------------' '-------------------' '-------------------'
{{< summary-bar feature_name="Docker Hardened Images" >}}
When you customize a DHI image with DHI Select or DHI Enterprise, the build process is simplified:
Docker handles the entire process automatically, so you don't need to manage builds for your customized images. However, you're responsible for testing your customized images and managing any CVEs introduced by your OCI artifacts.
The following diagram shows the customized image build flow:
.-------------------. .-------------------. .-------------------.
| Docker monitors |----->| Trigger rebuild |----->| Fetch base |
| OCI artifacts | | | | DHI image |
'-------------------' '-------------------' '-------------------'
|
v
.-------------------. .-------------------. .-------------------.
| Publish to |<-----| Sign & generate |<-----| Apply |
| Docker Hub | | attestations | | customizations |
'-------------------' '-------------------' '-------------------'