Skip to content

Commit d26377d

Browse files
committed
edits
1 parent 9e3841e commit d26377d

File tree

6 files changed

+11
-15
lines changed

6 files changed

+11
-15
lines changed

_vale/config/vocabularies/Docker/accept.txt

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,6 @@ Postgres
7979
PowerShell
8080
Python
8181
S3
82-
Seccomp
8382
SQLite
8483
Slack
8584
Snyk
@@ -93,7 +92,6 @@ Traefik
9392
Ubuntu
9493
Unix
9594
VMware
96-
VM
9795
Wasm
9896
Windows
9997
WireMock
@@ -122,6 +120,7 @@ Zsh
122120
[Rr]eal-time
123121
[Rr]untimes?
124122
[Ss]andbox(ed)?
123+
[Ss]eccomp
125124
[Ss]wappable
126125
[Ss]warm
127126
[Ss]ysfs

content/manuals/security/for-admins/hardened-desktop/enhanced-container-isolation/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Enhanced Container Isolation ensures stronger container isolation and also locks
2121

2222
> [!NOTE]
2323
>
24-
> ECI is in addition to other container security techniques used by Docker. For example, reduced Linux Capabilities, Seccomp, AppArmor.
24+
> ECI is in addition to other container security techniques used by Docker. For example, reduced Linux Capabilities, seccomp, and AppArmor.
2525
2626
## Who is it for?
2727

content/manuals/security/for-admins/hardened-desktop/enhanced-container-isolation/config.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ A couple of caveats:
176176

177177
* The `allowDerivedImages` setting only applies to local-only images built from
178178
an allowed image. That is, the derived image must not be present in a remote
179-
repository because if it were, you would just list it's name in the `imageList`.
179+
repository because if it were, you would just list its name in the `imageList`.
180180

181181
* For derived image checking to work, the parent image (i.e., the image in the
182182
`imageList`) must be present locally (i.e., must have been explicitly pulled
@@ -329,9 +329,8 @@ Whether to configure the list as an allow or deny list depends on the use case.
329329
| `feedback` | Send feedback to Docker |
330330
| `init` | Creates Docker-related starter files |
331331
| `manifest` | Manages Docker image manifests |
332-
| `plugins` | Manages plugins |
332+
| `plugin` | Manages plugins |
333333
| `sbom` | View Software Bill of Materials (SBOM) |
334-
| `scan` | Docker Scan |
335334
| `scout` | Docker Scout |
336335
| `trust` | Manage trust on Docker images |
337336

content/manuals/security/for-admins/hardened-desktop/enhanced-container-isolation/features-benefits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ container-to-host and cross-container isolation.
5555

5656
Privileged containers `docker run --privileged ...` are insecure because they
5757
give the container full access to the Linux kernel. That is, the container runs
58-
as true root with all capabilities enabled, Seccomp and AppArmor restrictions
58+
as true root with all capabilities enabled, seccomp and AppArmor restrictions
5959
are disabled, all hardware devices are exposed, for example.
6060

6161
Organizations aiming to secure Docker Desktop on developers' machines face challenges with privileged containers. These containers, whether running benign or malicious workloads, can gain control of the Linux kernel within the Docker Desktop VM, potentially altering security related settings, for example registry

content/manuals/security/for-admins/hardened-desktop/enhanced-container-isolation/how-eci-works.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,10 +51,10 @@ container and the Linux kernel inside the Docker Desktop VM.
5151

5252
For more information, see [Key features and benefits](features-benefits.md).
5353

54-
### Enhanced Container Isolation versus Docker Userns-Remap Mode
54+
### Enhanced Container Isolation versus user namespeace remapping
5555

5656
The Docker Engine includes a feature called [userns-remap mode](/engine/security/userns-remap/)
57-
that enables the user-namespace in all containers. However it suffers from a few
57+
that enables the user namespace in all containers. However it suffers from a few
5858
[limitations](/engine/security/userns-remap/) and it's
5959
not supported within Docker Desktop.
6060

content/manuals/security/for-admins/hardened-desktop/enhanced-container-isolation/limitations.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -50,17 +50,15 @@ Windows hosts and access Docker from within.
5050
### ECI protection for Docker builds with the "docker" driver
5151

5252
Prior to Docker Desktop 4.30, `docker build` commands that use the buildx
53-
`docker` driver (the default) are not protected by ECI (i.e., the build runs
54-
rootful inside the Docker Desktop VM).
53+
`docker` driver (the default) are not protected by ECI, in other words the build runs
54+
rootful inside the Docker Desktop VM.
5555

5656
Starting with Docker Desktop 4.30, `docker build` commands that use the buildx
57-
`docker` driver are protected by ECI (i.e., the build runs rootless inside
58-
the Docker Desktop VM), except when Docker Desktop is configured to use WSL 2
57+
`docker` driver are protected by ECI, except when Docker Desktop is configured to use WSL 2
5958
(on Windows hosts).
6059

6160
Note that `docker build` commands that use the `docker-container` driver are
62-
always protected by ECI (i.e., the build runs inside a rootless Docker
63-
container).
61+
always protected by ECI.
6462

6563
### Docker Build and Buildx have some restrictions
6664

0 commit comments

Comments
 (0)