Red Hat Hardened Images
Quick links
Overview
Red Hat Hardened Images offers a free, vendor-neutral catalog of trusted, micro-sized images created from Red Hat’s years of expertise. By reducing the images’ attack surface and moving security to the start of the build process, Red Hat Hardened Images reduces toil and lets teams stop chasing scanner noise and start shipping code. Red Hat Hardened Images can run on any Linux platforms.
Use cases
Red Hat Hardened Images addresses multiple challenges across teams.
Infrastructure teams
Natively integrating Red Hat Hardened Images helps teams manage vendor sprawl and maintain sound baselines.
Development teams
Red Hat Hardened Images removes the need to investigate image-level vulnerabilities. Move faster knowing the images have been tested for security.
Security teams
Reduce scanner noise and focus on application-level risk using a trusted image foundation with verifiable proof via a built-in Software Bill of Materials (SBOM).
Product highlights
| Feature | Details | Benefit | |
|---|---|---|---|
Micro-sized images | These images only contain the necessary tools and packages for running the application. | Faster deployments with a strong foundation that reduces friction between security and development teams. | |
Common Vulnerabilities and Exposures (CVE) remediation | Red Hat tracks upstream sources to provide swift CVE remediation with rigorous testing and vulnerability scanning. | We aim for "near-zero" known vulnerability states at image release for faster, confident development. | |
Image portability | The images can run on container platforms, cloud, or bare metal. | This approach creates greater flexibility for development and reduces vendor lock-in. | |
Infrastructure efficiency | Minimal size with enhanced layering enables efficient pulls and registry storage. | Reduce potential cloud usage costs and speed up deployment pipelines. | |
Validated security profiles | Red Hat Hardened Images comes with security profiles already applied and validated at creation. | Removes the need for weeks-long auditing processes. | |
Integrated SBOM | Red Hat provides verifiable images and an automated SBOM listing everything inside the image and its origins. | Developers can work with a solid foundation, while security teams have necessary and clear documentation. |
Fedora Hummingbird Linux
Fedora Hummingbird Linux will be a new, free, container-native, rolling Linux operating system designed for agent-first builders.