|
| 1 | +--- |
| 2 | +title: CIS Benchmark |
| 3 | +description: Learn how Docker Hardened Images comply with the CIS Docker Benchmark to help organizations harden container images for secure deployments. |
| 4 | +keywords: docker cis benchmark, cis docker compliance, cis docker images, docker hardened images, secure container images |
| 5 | +--- |
| 6 | + |
| 7 | +## What is the CIS Docker Benchmark? |
| 8 | + |
| 9 | +The [CIS Docker Benchmark](https://www.cisecurity.org/benchmark/docker) is part |
| 10 | +of the globally recognized CIS Benchmarks, developed by the [Center for |
| 11 | +Internet Security (CIS)](https://www.cisecurity.org/). It defines recommended secure |
| 12 | +configurations for all aspects of the Docker container ecosystem, including the |
| 13 | +container host, Docker daemon, container images, and the container runtime. |
| 14 | + |
| 15 | +## Why CIS Benchmark compliance matters |
| 16 | + |
| 17 | +Following the CIS Docker Benchmark helps organizations: |
| 18 | + |
| 19 | +- Reduce security risk with widely recognized hardening guidance. |
| 20 | +- Meet regulatory or contractual requirements that reference CIS controls. |
| 21 | +- Standardize image and Dockerfile practices across teams. |
| 22 | +- Demonstrate audit readiness with configuration decisions grounded in a public standard. |
| 23 | + |
| 24 | +## How Docker Hardened Images comply with the CIS Benchmark |
| 25 | + |
| 26 | +Docker Hardened Images (DHIs) are designed with security in mind and are |
| 27 | +verified to be compliant with the relevant controls from the latest CIS |
| 28 | +Docker Benchmark (v1.8.0) for the scope that applies to container images and |
| 29 | +Dockerfile configuration. |
| 30 | + |
| 31 | +CIS-compliant DHIs are compliant with all controls in Section 4, with the sole |
| 32 | +exception of the control requiring Docker Content Trust (DCT), which [Docker |
| 33 | +officially retired](https://www.docker.com/blog/retiring-docker-content-trust/). |
| 34 | +By starting from a CIS-compliant DHI, teams can adopt image-level best practices |
| 35 | +from the benchmark more quickly and confidently. |
| 36 | + |
| 37 | +> [!NOTE] |
| 38 | +> |
| 39 | +> The CIS Docker Benchmark also includes controls for the host, daemon, and |
| 40 | +> runtime. CIS-compliant DHIs address only the image and Dockerfile scope (Section |
| 41 | +> 4). Overall compliance still depends on how you configure and operate the |
| 42 | +> broader environment. |
| 43 | +
|
| 44 | +## Identify CIS-compliant images |
| 45 | + |
| 46 | +CIS-compliant images are labeled as **CIS** in the Docker Hardened Images catalog. |
| 47 | +To find them, [explore images](../how-to/explore.md) and look for the **CIS** |
| 48 | +designation on individual listings. |
| 49 | + |
| 50 | +## Get the benchmark |
| 51 | + |
| 52 | +Download the latest CIS Docker Benchmark directly from CIS: |
| 53 | +https://www.cisecurity.org/benchmark/docker |
0 commit comments