Back to blog

Docker Makes Hardened Images Free: What This Means For Container Security

Hello HaWkers, important news for anyone working with containers has just been announced: Docker has decided to make its Hardened Images catalog free, previously available only to paid subscribers.

This change has significant implications for the security of containerized applications. But what exactly are Hardened Images and why does this matter to you as a developer?

What Are Hardened Images

Hardened Images are Docker images that have undergone a rigorous security hardening process. Unlike traditional images, they are built following security best practices from the start.

Key characteristics:

  • Reduced attack surface (fewer packages installed)
  • Known vulnerabilities removed or mitigated
  • Security configurations applied by default
  • More frequent security updates
  • Compliance with standards like CIS Benchmarks

🔒 Context: According to Docker data, Hardened Images can have up to 90% fewer known vulnerabilities compared to traditional images.

Why Docker Made This Decision

The decision to release Hardened Images for free reflects an important strategy shift from the company:

Influencing factors:

  1. Competitive pressure: Other platforms like Chainguard and Google Distroless offer secure images at no additional cost
  2. Market demand: Companies increasingly require security as standard, not as an extra
  3. Recent incidents: Container vulnerabilities caused billions in damages in 2024
  4. Cloud native adoption: Kubernetes and containers have become mainstream

Market impact:

Before After
Hardened Images only for Docker Business Available to all users
Additional cost for security Security included by default
Limited adoption Democratization of security

What This Means For Developers

For developers and DevOps teams, this change brings immediate benefits:

Security At No Extra Cost

Now you can use secure base images without needing an enterprise subscription:

  • Node.js Hardened - For JavaScript/TypeScript applications
  • Python Hardened - For backends and ML
  • Go Hardened - For performant microservices
  • Nginx Hardened - For reverse proxies and web servers

Smaller Attack Surface

Hardened Images include only what's necessary to run your application:

Node.js comparison (example):

  • Traditional image: ~900MB, 150+ packages, 50+ known vulnerabilities
  • Hardened image: ~150MB, 30 essential packages, 0-5 known vulnerabilities

Simplified Compliance

For companies needing to meet regulations like SOC 2, PCI-DSS, or HIPAA, using Hardened Images significantly simplifies the compliance process.

How to Use Hardened Images

Migrating to Hardened Images is relatively straightforward. Here's how to adapt your Dockerfiles:

# Before: traditional image
FROM node:20-alpine

# After: hardened image
FROM docker.io/library/node:20-hardened

WORKDIR /app

COPY package*.json ./
RUN npm ci --only=production

COPY . .

# Non-root user already configured in Hardened Images
USER node

EXPOSE 3000
CMD ["node", "index.js"]

Migration usually only involves changing the base image tag. However, some applications may need adjustments due to stricter security restrictions.

Checking Vulnerabilities

You can compare image security using Docker Scout:

# Scan traditional image
docker scout cves node:20-alpine

# Scan hardened image
docker scout cves node:20-hardened

# Compare results
docker scout compare node:20-alpine --to node:20-hardened

Challenges and Considerations

Despite the benefits, there are some points to consider:

Compatibility

Some applications may depend on packages that were removed from Hardened Images. In these cases, you have two options:

  1. Explicitly install necessary packages in the Dockerfile
  2. Refactor the application to not depend on those packages

More Difficult Debugging

With fewer tools installed, debugging problems in production can be more challenging. Consider using sidecars for debugging when necessary.

Learning Curve

Teams accustomed to traditional images may need time to adapt their workflows.

Recommendation: Start by migrating development and staging environments before going to production.

Ecosystem Impact

This Docker decision should accelerate the adoption of security practices in containers:

Trends for 2025-2026:

  • Hardened Images becoming the industry standard
  • Greater pressure on other registries to offer secure images
  • Reduction in security incidents related to base image vulnerabilities
  • Simplification of security audits

💡 Tip: Even with Hardened Images, continue running vulnerability scans regularly. New CVEs are constantly being discovered.

Conclusion

Docker's decision to release Hardened Images for free represents an important milestone in democratizing container security. For developers, this means access to more secure images at no additional cost.

If you haven't migrated to Hardened Images yet, now is the ideal time. The transition is relatively simple and the benefits in terms of security and compliance are significant.

If you want to deepen your knowledge in DevOps and containers, I recommend checking out the article Containerization with Docker: Complete Guide where you'll find essential fundamentals for working with containers professionally.

Let's go! 🦅

Comments (0)

This article has no comments yet 😢. Be the first! 🚀🦅

Add comments