
Secure containers by default with Cloudsmith and Docker Hardened Images

Choosing a secure container base image has historically been a game of compromise between costs, tooling, and operational overhead. You either pay for premium images, struggle with the “tooling gap” of minimalist distroless builds, or drown your team in the manual labor of constant patching.
Docker is changing this equation by making its Docker Hardened Images (DHI) catalog–over 1,000 minimal, high-integrity images–freely available. But while the images are free, operationalizing them at scale across a massive engineering org is not.
That is where the combination of Docker and Cloudsmith becomes a cheat code for developers and security teams working at enterprise scale.
The developer advantage: Better ingredients, less prep
For a developer, a Docker Hardened Image isn't just more secure. It’s an evolutionary step forward that better protects against software supply chain threats and risks. DHIs arrive pre-patched and stripped of the bloatware found in typical images. They offer developers:
- Speed: These images are smaller, meaning they move across the network fast and start up in seconds.
- Automated hygiene: Docker handles the continuous patching of DHIs, monitoring upstream sources so you don’t have to.
- Audit-ready: Every DHI includes a Software Bill of Materials (SBOM) and SLSA Level 3 provenance. You get traceable security data from the very first layer of your build.
The Cloudsmith difference: One endpoint, zero sprawl
Most other artifact managers force you into repository sprawl. If you want to add a new source like DHIs, you’re stuck creating a new remote repository, a new local cache, and a new virtual repository to tie them together. Then, you have to hunt down every CI pipeline and developer config to update the endpoints.
This isn't just an operational challenge, it’s a security bottleneck. When the path to better security requires a manual overhaul of your internal infrastructure, adoption stalls. This friction often forces organizations to stick with "good enough" images, leaving them unnecessarily exposed to vulnerabilities that DHIs are designed to eliminate.
We architected Cloudsmith differently. Our repositories are natively multi-format and upstream-aware. Adding Docker Hardened Images isn't a migration project. It’s a natural extension of your current setup.
How it works in practice:
- Zero pipeline changes: Add DHI as an authenticated upstream source in Cloudsmith. Developers and build agents continue pulling from the same Cloudsmith URL they already use.
- Automated logic: Keep your existing Docker Hub upstream in place. Cloudsmith handles the authentication, caching, and routing behind the scenes.
- One URL: Continue using the same Cloudsmith repository URL you already have. You can keep your existing Docker Hub upstream active alongside DHI. Cloudsmith acts as the single, intelligent integration point between your stack and the outside world.
Cloudsmith lets you treat DHIs as just another upstream source rather than a special case project. From a developer and CI perspective, nothing changes. That means you eliminate the friction that usually kills security initiatives because behind the scenes, Cloudsmith handles the authentication, caching, and routing automatically. You get to enforce a hardened organizational standard without touching a single developer’s .docker/config.json.
Turning hardened images into an organizational standard
When DHIs flow through Cloudsmith, they become part of your controlled software supply chain. By supplying developers with base images via Cloudsmith, in addition to recommending better security, you provide a default environment that includes:
- Consistency: Every team builds from the same approved, cached base images.
- Visibility: You know exactly which images developers use and where they originated.
- Control: Security teams can apply policies that govern image usage without breaking the build.
Solving the coordination tax and rate-limit surprises
While DHIs are free of charge, they require authenticated access. For a single developer, this is a non-issue. At an organizational level, managing credentials for hundreds of build agents and thousands of CI pipelines is a nightmare.
The secret handshake: Centralized authentication
Cloudsmith becomes the single integration point between your organization and Docker Hub.
- No credential sprawl: You store your organization’s Docker Hub credentials in Cloudsmith once. Your developers and build agents then authenticate directly to Cloudsmith.
- Unified access: You avoid pushing configuration changes and tokens out to every individual client.
Reliability: Caching and rate limits
Docker Hub enforces strict pull rate limits. In a large CI/CD environment, you can hit these limits in minutes, breaking your builds.
- Advanced caching: Cloudsmith automatically caches requested DHIs.
- Zero surprises: Once an image is in your private repo, Cloudsmith serves future pulls directly from our global edge network. This should reduce or eliminate rate limiting issues.
Closing thoughts
DHI and Cloudsmith both offer significant intrinsic benefits, and even more power lies in the ease of their integration. Because Cloudsmith handles DHIs like any other upstream source, developers can configure their pipelines once and deploy at scale without disrupting their existing workflows. In short, Docker makes DHIs secure; Cloudsmith makes them easier to consume across an enterprise.
The result is a 'security win' by default that serves the entire engineering organization. By adopting these stronger defaults with zero added operational drag, teams can finally align their velocity with their security standards. Developers get to work with faster, higher-quality tools, while the organization gains a hardened, verifiable security posture. Together, we’re building a more trustworthy ecosystem where security isn't an external hurdle–it’s a built-in feature of the craft.
Achieving a secure supply chain shouldn't require a total re-architecture of your artifact repositories. See how Cloudsmith’s upstream-aware repositories can consolidate your Docker Hub, DHI, and internal images into a single, high-performance endpoint. Book a technical deep-dive to see our architecture in action.
More articles


Python 3.14 – What you need to know

Migrating from Docker Content Trust to Sigstore

Kubernetes 1.34 – What you need to know

Adding AI to applications using the Model Context Protocol

Docker Hardened Images & Cloudsmith: Modern Security for the Software Supply Chain
By submitting this form, you agree to our privacy policy
