Skip to content

Commit cef62c1

Browse files
authored
ENGDOCS-2306 (#21398)
<!--Delete sections as needed --> ## Description Freshness on IAM, HDD index page and Air-gapped containers page. ## Related issues or tickets <!-- Related issues, pull requests, or Jira tickets --> ## Reviews <!-- Notes for reviewers here --> <!-- List applicable reviews (optionally @tag reviewers) --> - [ ] Technical review - [ ] Editorial review - [ ] Product review
1 parent 524b00f commit cef62c1

File tree

6 files changed

+18
-19
lines changed

6 files changed

+18
-19
lines changed

_vale/Docker/Acronyms.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,7 @@ exceptions:
6060
- LTS
6161
- MAC
6262
- MDM
63+
- MDN
6364
- NAT
6465
- NET
6566
- NFS
@@ -90,6 +91,7 @@ exceptions:
9091
- SDK
9192
- SLES
9293
- SLSA
94+
- SOCKS
9395
- SPDX
9496
- SQL
9597
- SSD

_vale/config/vocabularies/Docker/accept.txt

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,7 @@ Zsh
108108
[Mm]oby
109109
[Oo]nboarding
110110
[Pp]aravirtualization
111+
[Pp]roxied
111112
[Pp]roxying
112113
[Rr]eal-time
113114
[Rr]untimes?
@@ -156,5 +157,6 @@ tmpfs
156157
ufw
157158
umask
158159
ungated
160+
untrusted
159161
vSphere
160162
vpnkit

content/manuals/security/for-admins/hardened-desktop/_index.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,9 @@ weight: 60
3737
3838
Hardened Docker Desktop is a group of security features, designed to improve the security of developer environments with minimal impact on developer experience or productivity.
3939

40-
It lets administrators enforce strict security settings, preventing developers and their containers from bypassing these controls, either intentionally or unintentionally. Additionally, you can enhance container isolation, to mitigate potential security threats such as malicious payloads breaching the Docker Desktop Linux VM and the underlying host.
40+
It lets you enforce strict security settings, preventing developers and their containers from bypassing these controls, either intentionally or unintentionally. Additionally, you can enhance container isolation, to mitigate potential security threats such as malicious payloads breaching the Docker Desktop Linux VM and the underlying host.
4141

42-
Hardened Docker Desktop moves the ownership boundary for Docker Desktop configuration to the organization, meaning that any security controls administrators set cannot be altered by the user of Docker Desktop.
42+
Hardened Docker Desktop moves the ownership boundary for Docker Desktop configuration to the organization, meaning that any security controls you set cannot be altered by the user of Docker Desktop.
4343

4444
It is for security conscious organizations who:
4545
- Don’t give their users root or administrator access on their machines
@@ -50,8 +50,8 @@ It is for security conscious organizations who:
5050

5151
Hardened Desktop features work independently but collectively to create a defense-in-depth strategy, safeguarding developer workstations against potential attacks across various functional layers, such as configuring Docker Desktop, pulling container images, and running container images. This multi-layered defense approach ensures comprehensive security. It helps mitigate against threats such as:
5252

53-
- Malware and supply chain attacks: Registry Access Management and Image Access Management prevent developers from accessing certain container registries and image types, significantly lowering the risk of malicious payloads. Additionally, ECI restricts the impact of containers with malicious payloads by running them without root privileges inside a Linux user namespace.
54-
- Lateral movement: Air-Gapped Containers lets administrators configure network access restrictions for containers, thereby preventing malicious containers from performing lateral movement within the organization's network.
55-
- Insider threats: Settings Management configures and locks various Docker Desktop settings so administrators can enforce company policies and prevent developers from introducing insecure configurations, intentionally or unintentionally.
53+
- Malware and supply chain attacks: Registry Access Management and Image Access Management prevent developers from accessing certain container registries and image types, significantly lowering the risk of malicious payloads. Additionally, Enhanced Container Isolation (ECI) restricts the impact of containers with malicious payloads by running them without root privileges inside a Linux user namespace.
54+
- Lateral movement: Air-gapped containers lets you configure network access restrictions for containers, thereby preventing malicious containers from performing lateral movement within the organization's network.
55+
- Insider threats: Settings Management configures and locks various Docker Desktop settings so you can enforce company policies and prevent developers from introducing insecure configurations, intentionally or unintentionally.
5656

5757
{{< grid >}}

content/manuals/security/for-admins/hardened-desktop/air-gapped-containers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ aliases:
99

1010
{{< introduced desktop 4.29.0 "/manuals/desktop/release-notes.md#4290" >}}
1111

12-
Air-Gapped Containers allows administrators to restrict containers from accessing network resources, limiting where data can be uploaded to or downloaded from.
12+
Air-gapped containers let you restrict containers from accessing network resources, limiting where data can be uploaded to or downloaded from.
1313

1414
Docker Desktop can apply a custom set of proxy rules to network traffic from containers. The proxy can be configured to:
1515

16-
- Allow network connections
16+
- Accept network connections
1717
- Reject network connections
1818
- Tunnel through an HTTP or SOCKS proxy
1919

@@ -79,7 +79,7 @@ The `FindProxyForURL` can return the following values:
7979

8080
- `PROXY host_or_ip:port`: Tunnels this request through the HTTP proxy `host_or_ip:port`
8181
- `SOCKS5 host_or_ip:port`: Tunnels this request through the SOCKS proxy `host_or_ip:port`
82-
- `DIRECT`: Allows this request to go direct, without a proxy
82+
- `DIRECT`: Lets this request go direct, without a proxy
8383
- `PROXY reject.docker.internal:any_port`: Rejects this request
8484

8585
In this particular example, HTTP and HTTPS requests for `internal.corp` are sent via the HTTP proxy `10.0.0.1:3128`. Requests to connect to IPs on the subnet `192.168.0.0/24` connect directly. All other requests are blocked.

content/manuals/security/for-admins/hardened-desktop/image-access-management.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -14,20 +14,15 @@ weight: 40
1414
>
1515
> Image Access Management is available to [Docker Business](/manuals/subscription/core-subscription/details.md#docker-business) customers only.
1616
17-
Image Access Management gives administrators control over which types of images, such as Docker Official Images, Docker Verified Publisher Images, or community images, their developers can pull from Docker Hub.
17+
Image Access Management gives you control over which types of images, such as Docker Official Images, Docker Verified Publisher Images, or community images, your developers can pull from Docker Hub.
1818

1919
For example, a developer, who is part of an organization, building a new containerized application could accidentally use an untrusted, community image as a component of their application. This image could be malicious and pose a security risk to the company. Using Image Access Management, the organization owner can ensure that the developer can only access trusted content like Docker Official Images, Docker Verified Publisher Images, or the organization’s own images, preventing such a risk.
2020

2121
## Prerequisites
2222

23-
You need to [enforce sign-in](../enforce-sign-in/_index.md). For Image Access
24-
Management to take effect, Docker Desktop users must authenticate to your
25-
organization. Enforcing sign-in ensures that your Docker Desktop developers
26-
always authenticate to your organization, even though they can authenticate
27-
without it and the feature will take effect. Enforcing sign-in guarantees the
28-
feature always takes effect.
23+
You first need to [enforce sign-in](/manuals/security/for-admins/enforce-sign-in/_index.md) to ensure that all Docker Desktop developers authenticate with your organization. Since Image Access Management requires a Docker Business subscription, enforced sign-in guarantees that only authenticated users have access and that the feature consistently takes effect across all users, even though it may still work without enforced sign-in.
2924

30-
## Configure Image Access Management permissions
25+
## Configure
3126

3227
{{< tabs >}}
3328
{{< tab name="Docker Hub" >}}

layouts/shortcodes/admin-image-access.html

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,12 @@
1010
2. {{ $iam_navigation }}
1111
3. Enable Image Access Management to set the permissions for the following categories of images you can manage:
1212

13-
- **Organization images**: Images from your organization are always allowed by default. These images can be public or private created by members within your organization.
13+
- **Organization Images**: Images from your organization are always allowed by default. These images can be public or private created by members within your organization.
1414
- **Docker Official Images**: A curated set of Docker repositories hosted on Hub. They provide OS repositories, best practices for Dockerfiles, drop-in solutions, and applies security updates on time.
1515
- **Docker Verified Publisher Images**: Images published by Docker partners that are part of the Verified Publisher program and are qualified to be included in the developer secure supply chain.
16-
- **Community images**: These images are disabled by default when Image Access Management is enabled because various users contribute them and they may pose security risks. This category includes Docker-Sponsored Open Source images.
16+
- **Community Images**: These images are disabled by default when Image Access Management is enabled because various users contribute them and they may pose security risks. This category includes Docker-Sponsored Open Source images.
1717

18-
> **Note**
18+
> [!NOTE]
1919
>
2020
> Image Access Management is turned off by default. However, owners in your organization have access to all images regardless of the settings.
2121

0 commit comments

Comments
 (0)