Now free for all developers. Docker's approach to supply chain security rests on five pillars: minimal images, signed provenance, complete SBOMs, VEX insights, and transparent verification.

Five pillars of supply chain security

  1. Minimal images – Distroless and Alpine bases shrink attack surface by up to 97%
  2. Signed provenance – Every build is signed and verifiable (SLSA Level 3)
  3. Complete SBOMs – Full software bill of materials for every image
  4. VEX insights – Vulnerability Exploitability eXchange for smarter remediation
  5. Transparent verification – No hidden CVEs; full visibility and control

Run Helm charts, hardened by Docker

Use Helm charts powered by Docker Hardened Images to deploy secure, compliant Kubernetes apps with confidence. Join the move to a safer container ecosystem – DHI is now free for everyone.

Learn core concepts of Docker security