Be the first to know and get exclusive access to offers by signing up for our mailing list(s).

Subscribe

We ❤️ Open Source

A community education resource

4 min read

Docker is retiring Content Trust – Here’s what that means for you

Sigstore vs Notation? What you need to know before choosing.

When working with containers, one of the big security concerns is making sure the images you’re using are legit. You want to ensure they’re not tampered with and coming from the right source. That’s where Docker’s “Content Trust” feature came in. It lets users verify the authenticity of images so you could confidently deploy them to your Kubernetes clusters.

A quick look at Docker Content Trust (DCT)

DCT is essentially a verification system built into the Docker client. When pulling or deploying images from a registry, it checks that they’ve been digitally signed using a Docker Notary server. Publishers sign their images, and users get peace of mind knowing what they’re pulling is genuine. It’s all built on top of The Update Framework (TUF), which helps manage freshness and integrity. If you’ve got DCT enabled correctly, Docker won’t let you deploy images that haven’t been signed.

So what exactly is changing

Here’s the thing: The Notary project (which DCT relies on) isn’t actively maintained anymore. The community has mostly moved on to newer tools for image signing. Docker has acknowledged this and plans to roll out a modern, more widely adopted image signing system for Docker Official Images (DOI). The Docker team expects to provide updates soon on their blog.

Starting August 8th, 2025, the oldest DCT signing certificates for DOI will start expiring. If you’ve used docker trust commands recently, you might have already seen some warnings. Once a certificate is cached by Docker, it doesn’t get updated, which makes rotating them kind of a pain.

Read more: Detecting vulnerabilities in public Helm charts

Moving to Sigstore or Notation

According to Docker’s official statement, if you publish images on Docker Hub using DCT, you should start planning to transition to a different image signing and verification solution (like Sigstore or Notation). Docker will be publishing migration guides soon to help you in that effort. Timelines for the complete deprecation of DCT have not yet been finalised. Cloudsmith has published a short blog post related to this migration process.

Sigstore vs. Notation: What’s the Difference?

Ultimately, users will make the choice of Sigstore or Notion as the replacement image signing and verification solution until such a time as Docker has implemented a new image signing solution for DOI. Many users are asking: “Which one should I use – Sigstore or Notation?” It’s a valid question, especially since both are open source and designed for image signing and verification. The differences mainly come down to:

  1. Signature formats
  2. How signatures are discovered
  3. How keys are managed

The simplest way I can compare these two solutions is that Sigstore, through Cosign, offers a developer-friendly, keyless signing experience using OIDC identities and transparency logs. Notary V2 (Notation), on the other hand, is capable of providing a more comprehensive, specification-driven approach with support for multiple signatures and integration with existing PKI. The links below should help you make an informed decision.

Further reading

  • Sigstore FAQ: The Sigstore team put together a clear breakdown of how their approach compares to Notary v2.
  • Getting started with Notary V2: This blog might be a bit dated, but it’s still a solid intro to the Notary v2 project. Anaïs Urlichs also provided a quickstart for using Notation.
  • Quickstart with Sigstore/Cosign: If you’d prefer to test out Sigstore, this guide walks you through the process of signing and verifying your first container.

More from We Love Open Source

About the Author

Nigel Douglas plays a key role in driving education around open source supply chain security at Cloudsmith. He spends his time drafting articles, blogs, and taking the stage to help bring awareness to how security needs to change in the cloud. Prior to his current role at Cloudsmith, he held similar Developer Relations positions at software security vendors such as Sysdig, Tigera, Malwarebytes, Solarwinds, and Google. He completed a Master of Science in Cybersecurity, Privacy, and Trust at South East Technological University in Ireland.

Read Nigel Douglas's Full Bio

The opinions expressed on this website are those of each author, not of the author's employer or All Things Open/We Love Open Source.

Want to contribute your open source content?

Contribute to We ❤️ Open Source

Help educate our community by contributing a blog post, tutorial, or how-to.

We're hosting two world-class events in 2026!

Join us for All Things AI, March 23-24 and for All Things Open, October 18-20.

Open Source Meetups

We host some of the most active open source meetups in the U.S. Get more info and RSVP to an upcoming event.