content/manuals/enterprise/security/hardened-desktop/image-access-management.md
{{< summary-bar feature_name="Hardened Docker Desktop" >}}
Image Access Management lets administrators control which types of images developers can pull from Docker Hub. This prevents developers from accidentally using untrusted community images that could pose security risks to your organization.
With Image Access Management, you can restrict access to:
You can also use a repository allow list to approve specific repositories that bypass all other access controls.
Image Access Management helps prevent supply chain attacks by ensuring developers only use trusted container images. For example, a developer building a new application might accidentally use a malicious community image as a component. Image Access Management prevents this by restricting access to only approved image types.
Common security scenarios include:
Use the repository allow list when you need to:
Before configuring Image Access Management, you must:
[!IMPORTANT]
Image Access Management only takes effect when users are signed in to Docker Desktop with organization credentials.
To configure Image Access Management:
Sign in to Docker Home and select your organization from the top-left account drop-down.
Select Admin Console, then Image access.
Use the toggle to enable image access.
Select which image types to allow:
Optionally, when Repository allow list is enabled in the previous step, you can add or remove specific repositories in the allow list:
Repositories in the allow list are accessible to all organization members regardless of the image type restrictions configured in the previous steps.
Once restrictions are applied, organization members can view the permissions page in read-only format.
[!NOTE]
Image Access Management is turned off by default. Organization owners have access to all images regardless of policy settings.
After configuring Image Access Management, test that restrictions work correctly.
When developers pull allowed image types:
$ docker pull nginx # Docker Official Image
# Pull succeeds if Docker Official Images are allowed
When developers pull blocked image types:
$ docker pull someuser/custom-image # Community image
Error response from daemon: image access denied: community images not allowed
Image access restrictions apply to all Docker Hub operations including pulls, builds using FROM instructions, and Docker Compose services.
Start with the most restrictive policy and gradually expand based on legitimate business needs:
Other security recommendations include:
FROM instructions, Docker Compose services using restricted images will fail, multi-stage builds may be affected if intermediate images are restricted, and CI/CD pipelines using diverse image types may be impacted.