Home
/
Manuals
/
Security Docker provides security guardrails for both administrators and developers.
If you're an administrator, you can enforce sign-in across Docker products for your developers, and
scale, manage, and secure your instances of Docker Desktop with DevOps security controls like Enhanced Container Isolation and Registry Access Management.
For both administrators and developers, Docker provides security-specific products such as Docker Scout, for securing your software supply chain with proactive image vulnerability monitoring and remediation strategies.
Explore the security features Docker offers to satisfy your company's security policies.
Learn how Settings Management can secure your developers' workflows.
Enhanced Container Isolation
Understand how Enhanced Container Isolation can prevent container attacks.
Registry Access Management
Control the registries developers can access while using Docker Desktop.
Control the images developers can pull from Docker Hub.
Restrict containers from accessing unwanted network resources.
Configure sign-in for members of your teams and organizations.
Identify uncaptured users in your organization.
Explore how Docker Scout can help you create a more secure software supply chain.
Learn how to configure SSO for your company or organization.
Set up SCIM to automatically provision and deprovision users.
Assign roles to individuals giving them different permissions within an organization.
Private marketplace for Extensions (Beta)
Learn how to configure and set up a private marketplace with a curated list of extensions for your Docker Desktop users.
See how you can protect your local environments, infrastructure, and networks without impeding productivity.
Set up two-factor authentication
Add an extra layer of authentication to your Docker account.
Create personal access tokens as an alternative to your password.
Static vulnerability scanning
Automatically run a point-in-time scan on your Docker images for vulnerabilities.
Understand how to keep Docker Engine secure.
Secrets in Docker Compose
Learn how to use secrets in Docker Compose.
Explore common security FAQs.
Understand the steps you can take to improve the security of your container.
Learn how to suppress non-applicable or fixed vulnerabilities found in your images.