File tree Expand file tree Collapse file tree 4 files changed +26
-11
lines changed Expand file tree Collapse file tree 4 files changed +26
-11
lines changed Original file line number Diff line number Diff line change @@ -34,8 +34,8 @@ requirements:
34
34
many language ecosystems and enterprise systems.
35
35
36
36
- Alpine-based images: A smaller and more lightweight option using musl libc.
37
- These images are faster to pull and have a reduced footprint, though you may
38
- need to account for musl-glibc differences in some applications .
37
+ These images tend to be small and are therefore faster to pull and have a
38
+ reduced footprint .
39
39
40
40
Each image maintains a minimal and secure runtime layer by removing
41
41
non-essential components like shells, package managers, and debugging tools.
@@ -52,8 +52,8 @@ with. Debian tends to offer the broadest compatibility.
52
52
53
53
## Development and runtime variants
54
54
55
- To accommodate different stages of the application lifecycle, DHI offers images
56
- in several variants:
55
+ To accommodate different stages of the application lifecycle, DHI offers all
56
+ language framework images and select application images in two variants:
57
57
58
58
- Development (dev) images: Equipped with necessary development tools and
59
59
libraries, these images facilitate the building and testing of applications in a
Original file line number Diff line number Diff line change @@ -23,7 +23,7 @@ The testing process for DHIs focuses on two main areas:
23
23
- Image standards compliance: Ensuring that each image adheres to strict size,
24
24
security, and compatibility standards.
25
25
- Application functionality: Verifying that applications within the images
26
- function correctly and meet expected performance benchmarks .
26
+ function correctly.
27
27
28
28
## Image standards compliance
29
29
@@ -33,8 +33,8 @@ Each DHI undergoes rigorous checks to meet the following standards:
33
33
unnecessary components to reduce potential vulnerabilities.
34
34
- Near-zero known CVEs: Images are scanned using tools like Docker Scout to
35
35
ensure they are free from known Common Vulnerabilities and Exposures (CVEs).
36
- - Multi-architecture support: DHIs are built for multiple architectures,
37
- including ` linux/amd64 ` and ` linux/arm64 ` , to ensure broad compatibility.
36
+ - Multi-architecture support: DHIs are built for multiple architectures
37
+ ( ` linux/amd64 ` and ` linux/arm64 ` ) to ensure broad compatibility.
38
38
- Kubernetes compatibility: Images are tested to run seamlessly within
39
39
Kubernetes clusters, ensuring they meet the requirements for container
40
40
orchestration environments.
Original file line number Diff line number Diff line change @@ -77,17 +77,17 @@ so you don’t have to.
77
77
environment while maintaining compatibility with common Linux distributions.
78
78
They remove non-essential components like shells and package managers to
79
79
enhance security, yet retain a small base layer built on familiar distribution
80
- standards. You can choose between Alpine-based images (using musl libc) and
81
- Debian-based images (using glibc) to suit your application's compatibility
82
- requirements .
80
+ standards. Images are typically available with musl libc (Alpine-based ) and
81
+ glibc ( Debian-based), supporting a broad range of application compatibility
82
+ needs .
83
83
84
84
## Why use Docker Hardened Images?
85
85
86
86
Docker Hardened Images (DHIs) are secure by default, minimal by design, and
87
87
maintained so you don't have to. They offer:
88
88
89
89
90
- - Images built for peace of mind: Ultra-minimal and distroless, DHIs eliminate up to 95 percent of the traditional container attack surface.
90
+ - Images built for peace of mind: Ultra-minimal and distroless, DHIs eliminate up to 95% of the traditional container attack surface.
91
91
- No more patch panic: With continuous CVE scanning and SLA-backed remediation, Docker helps you stay ahead of threats.
92
92
- Audit-ready images: All DHIs include signed SBOMs, VEX, and provenance that support security and compliance workflows.
93
93
- Images that work with your stack: Available in Alpine and Debian flavors, DHIs drop into your existing Dockerfiles and pipelines.
Original file line number Diff line number Diff line change @@ -158,6 +158,21 @@ $ docker push registry.example.com/my-project/<image>:<tag>
158
158
> To continue receiving image updates and preserve access to Docker Hardened
159
159
> Images, ensure that any copies pushed to other registries remain private.
160
160
161
+ ### Include attestations when mirroring images
162
+
163
+ Docker Hardened Images are signed and include associated attestations that
164
+ provide metadata such as build provenance and vulnerability scan results. These
165
+ attestations are stored as OCI artifacts and are not included by default when
166
+ using the Docker CLI to mirror images.
167
+
168
+ To preserve the full security context when copying DHIs to another registry, you
169
+ must explicitly include the attestations. One tool is ` regctl ` , which supports
170
+ copying both images and their associated artifacts.
171
+
172
+ For more details on how to use ` regctl ` to copy images and their associated
173
+ artifacts, see the [ regclient
174
+ documentation] ( https://regclient.org/cli/regctl/image/copy/ ) .
175
+
161
176
## What's next
162
177
163
178
After mirroring an image repository, you can you can start [ using the
You can’t perform that action at this time.
0 commit comments