Curious what Docker Hardened Images actually look like in real life? This walkthrough from Mohammad-Ali A'RÂBI shows how to work with DHI in build and runtime stages, pull images locally, and scan them with Docker Scout and Trivy - so you can see, verify, and understand what you’re getting out of the box before using them in real workloads. https://bit.ly/4rBvEUV
Docker, Inc
Software Development
San Francisco, California 770,813 followers
Docker helps developers bring their ideas to life by conquering the complexity of app development.
About us
At Docker, we simplify the lives of developers who are making world-changing apps. Docker helps developers bring their ideas to reality by conquering the complexity of app development. We simplify and accelerate workflows with an integrated development pipeline and application components. Actively used by millions of developers around the world, Docker Desktop and Docker Hub provide unmatched simplicity, agility and choice.
- Website
-
http://www.docker.com
External link for Docker, Inc
- Industry
- Software Development
- Company size
- 501-1,000 employees
- Headquarters
- San Francisco, California
- Type
- Privately Held
- Founded
- 2013
- Specialties
- Containerization, Open Source, Containers, Virtualization, System Administration, Scaling, Orchestration, and developers
Products
Docker
Container Management Software
Learn how Docker helps developers bring their ideas to life by conquering the complexity of app development.
Locations
-
Primary
Get directions
144 Townsend Street
San Francisco, California 94107, US
Employees at Docker, Inc
Updates
-
If you missed the recent Docker Hardened Images webinar, this is a great breakdown of the key points, particularly for devs working with Kubernetes ⬇️
🔐 #CVEs, #Containers, and the #Kubernetes Burden This image from the Docker Hardened Images Webinar really shows the reality of the issues we face in Systems Engineering. “Expecting every team to manage CVEs, rebuild images, validate fixes… across every dimension” → is not scalable. In Kubernetes environments, this challenge multiplies: - Every base image becomes a pod template - Every runtime (#Python, #Node, etc.) becomes a container spec - Every variant (dev/prod, alpine/debian) becomes a Helm value - Every architecture becomes a node selector - Every version becomes a deployment matrix - Every CVE becomes a ticket, a scan alert, a compliance blocker And yet — we expect every team to: - Patch CVEs - Rebuild images - Validate fixes - Maintain provenance - Pass compliance - Stay upstream-aligned All while shipping features. Kubernetes doesn’t simplify this. It amplifies it. Without platform-level abstractions, image automation, and centralized CVE remediation, this becomes a full-time job for every team. 🚀 Big News: Docker Hardened Images Are Now Open Source This is a huge step forward for the community. Docker Hardened Images — previously available only to enterprise customers — are now open source and publicly accessible. This means: - Pre‑hardened, security‑optimized base images - Faster CVE remediation without every team reinventing the wheel - Consistent, validated, reproducible images across environments - Better compliance posture (FIPS, STIG, regulated workloads) - A stronger foundation for Kubernetes platforms and internal developer portals Instead of every team maintaining their own image pipelines, we finally have a shared, community‑driven baseline that reduces duplicated effort and risk. This is exactly the kind of shift the industry needs: not just “shift left,” but shift down into the platform — where security, compliance, and lifecycle management can be handled once and consumed everywhere. ✅ The Bottom Line - Teams shouldn’t have to fight CVEs alone 🤝 - Kubernetes shouldn’t make security harder - Open-sourced Docker Hardened Images give us a real path to scalable, secure, and consistent container foundations This is how we make container security sustainable — by design, not by exhaustion. 🔗Post by Docker, Inc team: https://lnkd.in/gVhaprTN 🔗Docker Portal for Docker Hardened Images (DHI): https://lnkd.in/gDGWGxeQ #SystemsEngineering #Kubernetes #CloudSecurity #DevOps #PlatformEngineering #ContainerSecurity #SupplyChainSecurity #AIInfrastructure #Remoder
-
-
Want a practical way to run LLMs locally, without relying on cloud APIs or usage-based billing? As more teams look for tighter control over cost, data, and infrastructure, running models locally is becoming a practical requirement. In this hands-on workshop, Docker Captain Rami Krispin walks through how Docker Model Runner (DMR) makes local, repeatable LLM workflows easier to set up and manage. You'll learn to: - Set up DMR in Docker Desktop - Pull models from Docker Hub & Hugging Face - Prompt via terminal or Python - Build repeatable, private, cloud-free AI workflows Perfect for data scientists, ML engineers, and devs exploring local LLM tooling, even if you’ve never used Docker before. Feb 15 @ 10am ET Register here: https://bit.ly/4qdTo0c
-
Secure-by-default should actually BE the default. If you’re pulling images and installing dependencies, protection should already be there. That’s why it’s great to see Socket CEO Feross Aboukhadijeh call out how free Docker Hardened Images embed the Socket firewall by default.
-
-
If you want a clear, fast way to understand what Docker Hardened Images are and how the free, enterprise, and extended support options differ, this post delivers. ItsFOSS distills the essentials into a concise overview that focuses on what actually matters for developers and platform teams. Check it out now: https://lnkd.in/gCBvYMCp
-
MCP servers are powerful - but managing runtimes, secrets, and N×N client wiring quickly becomes a bottleneck. This edition of the Docker AI Labs Newsletter covers how to move from simple tool setups to full multi-agent systems without glue code; using Docker’s MCP Catalog and Toolkit, the open-source MCP Gateway, and cagent. This is a relevant read whether you’re just getting started with MCP or scaling it in real production use:
-
New with Docker MCP Catalog and Toolkit Discover tools with mcp-find, load them on demand with mcp-add, compose tools using JavaScript, and run everything with secure sandboxing and agent-driven OAuth. Learn more → https://lnkd.in/gtDs3Sg9
-
-
To get the most out of Docker Hardened Images, it helps to understand exactly what’s inside them and how they’re built. This is part two in a three-part series focused on exactly that. This post shows how to independently verify DHI by checking signatures, build provenance, compliance evidence, and SBOMs. Read more:
-
Claude Code doesn’t have to run in the cloud - or cost you anything. This post shows how to run Claude Code entirely locally using Docker Model Runner and open models, giving you a private AI coding setup with zero API costs. Step by step, you’ll see how to get the full Claude Code experience - agentic workflows, repo-aware reasoning, and terminal-native UX. All of this runs on your own machine, giving you complete control over your data and infrastructure. Learn more: