Skip to content

Commit cedf79b

Browse files
dhi: feedback followup (#22859)
<!--Delete sections as needed --> ## Description Update DHI docs based on internal feedback. ## Related issues or tickets ENGDOCS-2739 ## Reviews - [ ] Editorial review Signed-off-by: Craig <[email protected]>
1 parent 3011862 commit cedf79b

File tree

4 files changed

+26
-11
lines changed

4 files changed

+26
-11
lines changed

content/manuals/dhi/about/available.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,8 @@ requirements:
3434
many language ecosystems and enterprise systems.
3535

3636
- Alpine-based images: A smaller and more lightweight option using musl libc.
37-
These images are faster to pull and have a reduced footprint, though you may
38-
need to account for musl-glibc differences in some applications.
37+
These images tend to be small and are therefore faster to pull and have a
38+
reduced footprint.
3939

4040
Each image maintains a minimal and secure runtime layer by removing
4141
non-essential components like shells, package managers, and debugging tools.
@@ -52,8 +52,8 @@ with. Debian tends to offer the broadest compatibility.
5252

5353
## Development and runtime variants
5454

55-
To accommodate different stages of the application lifecycle, DHI offers images
56-
in several variants:
55+
To accommodate different stages of the application lifecycle, DHI offers all
56+
language framework images and select application images in two variants:
5757

5858
- Development (dev) images: Equipped with necessary development tools and
5959
libraries, these images facilitate the building and testing of applications in a

content/manuals/dhi/about/test.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The testing process for DHIs focuses on two main areas:
2323
- Image standards compliance: Ensuring that each image adheres to strict size,
2424
security, and compatibility standards.
2525
- Application functionality: Verifying that applications within the images
26-
function correctly and meet expected performance benchmarks.
26+
function correctly.
2727

2828
## Image standards compliance
2929

@@ -33,8 +33,8 @@ Each DHI undergoes rigorous checks to meet the following standards:
3333
unnecessary components to reduce potential vulnerabilities.
3434
- Near-zero known CVEs: Images are scanned using tools like Docker Scout to
3535
ensure they are free from known Common Vulnerabilities and Exposures (CVEs).
36-
- Multi-architecture support: DHIs are built for multiple architectures,
37-
including `linux/amd64` and `linux/arm64`, to ensure broad compatibility.
36+
- Multi-architecture support: DHIs are built for multiple architectures
37+
(`linux/amd64` and `linux/arm64`) to ensure broad compatibility.
3838
- Kubernetes compatibility: Images are tested to run seamlessly within
3939
Kubernetes clusters, ensuring they meet the requirements for container
4040
orchestration environments.

content/manuals/dhi/about/what.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -77,17 +77,17 @@ so you don’t have to.
7777
environment while maintaining compatibility with common Linux distributions.
7878
They remove non-essential components like shells and package managers to
7979
enhance security, yet retain a small base layer built on familiar distribution
80-
standards. You can choose between Alpine-based images (using musl libc) and
81-
Debian-based images (using glibc) to suit your application's compatibility
82-
requirements.
80+
standards. Images are typically available with musl libc (Alpine-based) and
81+
glibc (Debian-based), supporting a broad range of application compatibility
82+
needs.
8383

8484
## Why use Docker Hardened Images?
8585

8686
Docker Hardened Images (DHIs) are secure by default, minimal by design, and
8787
maintained so you don't have to. They offer:
8888

8989

90-
- Images built for peace of mind: Ultra-minimal and distroless, DHIs eliminate up to 95 percent of the traditional container attack surface.
90+
- Images built for peace of mind: Ultra-minimal and distroless, DHIs eliminate up to 95% of the traditional container attack surface.
9191
- No more patch panic: With continuous CVE scanning and SLA-backed remediation, Docker helps you stay ahead of threats.
9292
- Audit-ready images: All DHIs include signed SBOMs, VEX, and provenance that support security and compliance workflows.
9393
- Images that work with your stack: Available in Alpine and Debian flavors, DHIs drop into your existing Dockerfiles and pipelines.

content/manuals/dhi/how-to/mirror.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -158,6 +158,21 @@ $ docker push registry.example.com/my-project/<image>:<tag>
158158
> To continue receiving image updates and preserve access to Docker Hardened
159159
> Images, ensure that any copies pushed to other registries remain private.
160160
161+
### Include attestations when mirroring images
162+
163+
Docker Hardened Images are signed and include associated attestations that
164+
provide metadata such as build provenance and vulnerability scan results. These
165+
attestations are stored as OCI artifacts and are not included by default when
166+
using the Docker CLI to mirror images.
167+
168+
To preserve the full security context when copying DHIs to another registry, you
169+
must explicitly include the attestations. One tool is `regctl`, which supports
170+
copying both images and their associated artifacts.
171+
172+
For more details on how to use `regctl` to copy images and their associated
173+
artifacts, see the [regclient
174+
documentation](https://regclient.org/cli/regctl/image/copy/).
175+
161176
## What's next
162177

163178
After mirroring an image repository, you can you can start [using the

0 commit comments

Comments
 (0)