Docker Hardened Images - what you need to know
In 2025, containers became the default route to production for the global software industry, and the container supply chain became one of its largest security liabilities. With Docker Hardened Images (DHI), Docker moved beyond image distribution into supply-chain hardening—opening a catalog of continuously patched images built on familiar Alpine and Debian roots.
What originated out of a commercial solution was open-sourced in the end of 2025.
This short talk examines DHI not as a product announcement, but as a signal for where the ecosystem is heading: transparent CVE reporting, minimal distroless-style bases, signed provenance, hardened helm charts, and free/open foundations for regulated workloads.
With this talk I want to give a quick insight on what you need to know to use them.
talkDetail.whenAndWhere
What originated out of a commercial solution was open-sourced in the end of 2025.
This short talk examines DHI not as a product announcement, but as a signal for where the ecosystem is heading: transparent CVE reporting, minimal distroless-style bases, signed provenance, hardened helm charts, and free/open foundations for regulated workloads.
With this talk I want to give a quick insight on what you need to know to use them.
Matthias Haeussler
talkDetail.shareFeedback
talkDetail.feedbackNotYetAvailable
talkDetail.feedbackAvailableAfterStart
talkDetail.signInRequired
talkDetail.signInToFeedbackDescription
occupancy.title
occupancy.votingNotYetAvailable
occupancy.votingAvailableBeforeStart
talkDetail.signInRequired
occupancy.signInToVoteDescription
comments.speakerNotEnabledComments