Hardened Docker Desktop

Subscription: Business
For: Administrators

Hardened Docker Desktop provides a collection of security features designed to strengthen developer environments without compromising productivity or developer experience.

With Hardened Docker Desktop, you can enforce strict security policies that prevent developers and containers from bypassing organizational controls. You can also enhance container isolation to protect against security threats like malicious payloads that might breach the Docker Desktop Linux VM or underlying host system.

Who should use Hardened Docker Desktop?

Hardened Docker Desktop is ideal for security-focused organizations that:

  • Don't provide root or administrator access to developers' machines
  • Want centralized control over Docker Desktop configurations
  • Must meet specific compliance requirements

How Hardened Docker Desktop works

Hardened Docker Desktop features work independently and together to create a defense-in-depth security strategy. They protect developer workstations against attacks across multiple layers, including Docker Desktop configuration, container image management, and container runtime security:

  • Registry Access Management and Image Access Management prevent access to unauthorized container registries and image types, reducing exposure to malicious payloads
  • Enhanced Container Isolation runs containers without root privileges inside a Linux user namespace, limiting the impact of malicious containers
  • Air-gapped containers let you configure network restrictions for containers, preventing malicious containers from accessing your organization's internal network resources
  • Settings Management locks down Docker Desktop configurations to enforce company policies and prevent developers from introducing insecure settings, whether intentionally or accidentally

Next steps

Explore Hardened Docker Desktop features to understand how they can strengthen your organization's security posture: