File tree Expand file tree Collapse file tree 4 files changed +26
-11
lines changed Expand file tree Collapse file tree 4 files changed +26
-11
lines changed Original file line number Diff line number Diff line change @@ -34,8 +34,8 @@ requirements:
3434 many language ecosystems and enterprise systems.
3535
3636- Alpine-based images: A smaller and more lightweight option using musl libc.
37- These images are faster to pull and have a reduced footprint, though you may
38- need to account for musl-glibc differences in some applications .
37+ These images tend to be small and are therefore faster to pull and have a
38+ reduced footprint .
3939
4040Each image maintains a minimal and secure runtime layer by removing
4141non-essential components like shells, package managers, and debugging tools.
@@ -52,8 +52,8 @@ with. Debian tends to offer the broadest compatibility.
5252
5353## Development and runtime variants
5454
55- To accommodate different stages of the application lifecycle, DHI offers images
56- in several variants:
55+ To accommodate different stages of the application lifecycle, DHI offers all
56+ language framework images and select application images in two variants:
5757
5858- Development (dev) images: Equipped with necessary development tools and
5959libraries, these images facilitate the building and testing of applications in a
Original file line number Diff line number Diff line change @@ -23,7 +23,7 @@ The testing process for DHIs focuses on two main areas:
2323- Image standards compliance: Ensuring that each image adheres to strict size,
2424 security, and compatibility standards.
2525- Application functionality: Verifying that applications within the images
26- function correctly and meet expected performance benchmarks .
26+ function correctly.
2727
2828## Image standards compliance
2929
@@ -33,8 +33,8 @@ Each DHI undergoes rigorous checks to meet the following standards:
3333 unnecessary components to reduce potential vulnerabilities.
3434- Near-zero known CVEs: Images are scanned using tools like Docker Scout to
3535 ensure they are free from known Common Vulnerabilities and Exposures (CVEs).
36- - Multi-architecture support: DHIs are built for multiple architectures,
37- including ` linux/amd64 ` and ` linux/arm64 ` , to ensure broad compatibility.
36+ - Multi-architecture support: DHIs are built for multiple architectures
37+ ( ` linux/amd64 ` and ` linux/arm64 ` ) to ensure broad compatibility.
3838- Kubernetes compatibility: Images are tested to run seamlessly within
3939 Kubernetes clusters, ensuring they meet the requirements for container
4040 orchestration environments.
Original file line number Diff line number Diff line change @@ -77,17 +77,17 @@ so you don’t have to.
7777 environment while maintaining compatibility with common Linux distributions.
7878 They remove non-essential components like shells and package managers to
7979 enhance security, yet retain a small base layer built on familiar distribution
80- standards. You can choose between Alpine-based images (using musl libc) and
81- Debian-based images (using glibc) to suit your application's compatibility
82- requirements .
80+ standards. Images are typically available with musl libc (Alpine-based ) and
81+ glibc ( Debian-based), supporting a broad range of application compatibility
82+ needs .
8383
8484## Why use Docker Hardened Images?
8585
8686Docker Hardened Images (DHIs) are secure by default, minimal by design, and
8787maintained so you don't have to. They offer:
8888
8989
90- - Images built for peace of mind: Ultra-minimal and distroless, DHIs eliminate up to 95 percent of the traditional container attack surface.
90+ - Images built for peace of mind: Ultra-minimal and distroless, DHIs eliminate up to 95% of the traditional container attack surface.
9191- No more patch panic: With continuous CVE scanning and SLA-backed remediation, Docker helps you stay ahead of threats.
9292- Audit-ready images: All DHIs include signed SBOMs, VEX, and provenance that support security and compliance workflows.
9393- Images that work with your stack: Available in Alpine and Debian flavors, DHIs drop into your existing Dockerfiles and pipelines.
Original file line number Diff line number Diff line change @@ -158,6 +158,21 @@ $ docker push registry.example.com/my-project/<image>:<tag>
158158> To continue receiving image updates and preserve access to Docker Hardened
159159> Images, ensure that any copies pushed to other registries remain private.
160160
161+ ### Include attestations when mirroring images
162+
163+ Docker Hardened Images are signed and include associated attestations that
164+ provide metadata such as build provenance and vulnerability scan results. These
165+ attestations are stored as OCI artifacts and are not included by default when
166+ using the Docker CLI to mirror images.
167+
168+ To preserve the full security context when copying DHIs to another registry, you
169+ must explicitly include the attestations. One tool is ` regctl ` , which supports
170+ copying both images and their associated artifacts.
171+
172+ For more details on how to use ` regctl ` to copy images and their associated
173+ artifacts, see the [ regclient
174+ documentation] ( https://regclient.org/cli/regctl/image/copy/ ) .
175+
161176## What's next
162177
163178After mirroring an image repository, you can you can start [ using the
You can’t perform that action at this time.
0 commit comments