Skip to content

Commit 6e37ae7

Browse files
committed
Clarify ECI protection for docker build and Kubernetes.
Signed-off-by: Cesar Talledo <[email protected]>
1 parent 3e0ca83 commit 6e37ae7

File tree

1 file changed

+33
-12
lines changed
  • content/manuals/security/for-admins/hardened-desktop/enhanced-container-isolation

1 file changed

+33
-12
lines changed

content/manuals/security/for-admins/hardened-desktop/enhanced-container-isolation/faq.md

Lines changed: 33 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -66,25 +66,46 @@ See [ECI Docker socket mount permissions](config.md#docker-socket-mount-permissi
6666

6767
### Does ECI protect all containers launched with Docker Desktop?
6868

69-
Not yet. It protects all containers launched by users via `docker create` and
69+
Not yet. It protects all containers launched by users via `docker create`, and
7070
`docker run`.
7171

72-
Prior to Docker Desktop 4.30, it did not protect containers implicitly used by
73-
`docker build` with the `docker` build driver (the default driver). Starting
74-
with Docker Desktop 4.30, it protects such containers, except for Docker Desktop
75-
on WSL 2 (Windows hosts).
72+
For containers implicitly run by `docker build` as well as Docker
73+
Desktop's integrated Kubernetes, protection varies depending on the Docker
74+
Desktop version (see the next two FAQs below).
7675

77-
Note that ECI always protects containers used by `docker build`, when using the
78-
[docker-container build driver](/manuals/build/builders/drivers/_index.md), since Docker
79-
Desktop 4.19 and on all supported platforms (Windows with WSL 2 or Hyper-V, Mac,
80-
and Linux).
76+
ECI does not yet protect Docker Desktop Extension containers and
77+
[Dev Environments containers](/manuals/desktop/features/dev-environments/_index.md).
8178

82-
ECI does not yet protect Docker Desktop Kubernetes pods, Extension containers,
83-
and [Dev Environments containers](/manuals/desktop/features/dev-environments/_index.md).
79+
### Does ECI protect containers implicitly used by "docker build"?
80+
81+
Prior to Docker Desktop 4.19, ECI did not protect containers used implicitly
82+
by `docker build` during the build process.
83+
84+
Since Docker Desktop 4.19, ECI protects containers used by `docker build`
85+
when using the [docker-container build driver](/manuals/build/builders/drivers/_index.md),
86+
on all supported platforms (Windows with WSL 2 or Hyper-V, Mac, and Linux).
87+
88+
In addition, since Docker Desktop 4.30, ECI also protects containers used by
89+
`docker build` when using the `docker` build driver (the default driver), on all
90+
supported platforms except Windows with WSL 2.
91+
92+
### Does ECI protect Kubernetes in Docker Desktop?
93+
94+
Prior to Docker Desktop 4.38, ECI did not proect the Kubernetes cluster
95+
integrated in Docker Desktop.
96+
97+
Since Docker Desktop 4.38, ECI protects the integreated Kubernetes cluster
98+
when using the new "kind" provisioner (see [Deploy On Kubernetes](../../../../desktop/features/kubernetes.md)).
99+
In this case, each node in the multi-node Kubernetes cluster is actually an ECI
100+
protected container. With ECI disabled, each node in the Kubernetes cluster is
101+
a less-secure fully privileged container.
102+
103+
ECI does not protect the integrated Kubernetes cluster when using the
104+
older "Kubeadm" provisioner (single-node cluster).
84105

85106
### Does ECI protect containers launched prior to enabling ECI?
86107

87-
No. Containers created prior to switching on ECI are not protected. Therefore, it is
108+
No. Containers created prior to switching on ECI are not protected. Therefore, it is
88109
recommended you remove all containers prior to switching on ECI.
89110

90111
### Does ECI affect the performance of containers?

0 commit comments

Comments
 (0)