content/manuals/dhi/explore/what.md
In today’s diverse software environments, container images are often designed for flexibility and broad compatibility. While that makes them ideal for many use cases, it can also result in images that include more components than needed for specific workloads. Docker Hardened Images take a minimal-by-design approach to help reduce image size, limit the attack surface, and streamline security and compliance workflows.
Hardened images solve this by minimizing what's in the container image. Less software means fewer vulnerabilities, faster deployments, and fewer red dashboards to chase down every week.
For platform engineers and security teams, hardened images offer a way out of the CVE triage cycle, letting you focus on delivering secure, compliant infrastructure without constant firefighting.
A hardened image is a container image that has been deliberately minimized and secured to reduce vulnerabilities and meet stringent security and compliance requirements. Unlike standard images, which may include non-essential components that increase risk, hardened images are streamlined to include only what’s needed to run your application securely.
Docker Hardened Images (DHIs) take hardened images even further by combining minimal, secure design with enterprise-grade support and tooling. Built with security at the core, these images are continuously maintained, tested, and validated to meet today’s toughest software supply chain and compliance standards.
Docker Hardened Images are secure by default, minimal by design, and maintained so you don’t have to.
SLSA-compliant builds: Docker Hardened Images are built to meet SLSA Build Level 3, ensuring a tamper-resistant, verifiable, and auditable build process that protects against supply chain threats.
Distroless approach: Unlike traditional base images that bundle an entire OS with shells, package managers, and debugging tools, distroless images retain only the minimal OS components required to run your application. By excluding unnecessary tooling and libraries, they reduce the attack surface by up to 95% and can improve performance and image size.
Continuous maintenance: All DHIs are continuously monitored and updated to maintain near-zero known exploitable CVEs, helping your teams avoid patch fatigue and surprise alerts.
Compliance-ready: Each image includes cryptographically signed metadata:
Compatibility-focused design: Docker Hardened Images provide a minimal runtime environment while maintaining compatibility with common Linux distributions. They remove non-essential components like shells and package managers to enhance security, yet retain a small base layer built on familiar distribution standards. Images are typically available with musl libc (Alpine-based) and glibc (Debian-based), supporting a broad range of application compatibility needs.
Docker Hardened Images (DHIs) are secure by default, minimal by design, and maintained so you don't have to. They offer: