Open Source · MIT · Docker / Podman
HARDN-Docker

Container Security
Baseline

HARDN-Docker enforces CIS Docker Benchmark v1.7 controls across your container infrastructure. Rootless execution, hardened profiles, and image compliance scanning, configured by default.

CIS Docker Benchmark

Full CIS Docker Benchmark v1.7 control implementation, host, daemon, images, and runtime.

Rootless Execution

Configures Docker and Podman for rootless operation, eliminating privilege escalation vectors.

Read-Only Filesystems

Mounts container filesystems as read-only by default with explicit writeable volume mounts.

Seccomp + AppArmor

Ships hardened seccomp and AppArmor profiles that restrict dangerous syscalls by default.

Image Compliance Scan

OCI image scanning validates base images against known CVEs and hardening requirements.

CI/CD Integration

GitHub Actions and GitLab CI examples for policy enforcement on every container build.

Quick Start

Option A, Docker Pull
# Pull the pre-built image from GitHub Container Registry
docker pull ghcr.io/security-international-group/hardn-docker:latest
# Run with hardened defaults (read-only rootfs, no-new-privileges)
docker run --rm \
--read-only \
--security-opt no-new-privileges \
--cap-drop ALL \
ghcr.io/security-international-group/hardn-docker:latest
Option B, Clone & Build
# Clone the repository
git clone https://github.com/Security-International-Group/HARDN_DOCKER.git
cd HARDN_DOCKER
# Build the hardened image locally
docker build -t hardn-docker .
# Or use Docker Compose
docker compose up -d