Skip to content

Commit f632e6e

Browse files
dhi: add cis compliance concept (#23237)
<!--Delete sections as needed --> ## Description Added CIS Docker concept. Updated index for the concepts. https://deploy-preview-23237--docsdocker.netlify.app/dhi/core-concepts/cis/ https://deploy-preview-23237--docsdocker.netlify.app/dhi/core-concepts/#compliance-standards ## Related issues or tickets DHI-620 ## Reviews <!-- Notes for reviewers here --> <!-- List applicable reviews (optionally @tag reviewers) --> - [ ] Editorial review - [ ] Product review Signed-off-by: Craig <[email protected]>
1 parent 8540380 commit f632e6e

File tree

2 files changed

+64
-0
lines changed

2 files changed

+64
-0
lines changed

content/manuals/dhi/core-concepts/_index.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ params:
2020
description: Learn how build provenance metadata helps trace the origin of Docker Hardened Images and support compliance with SLSA.
2121
icon: track_changes
2222
link: /dhi/core-concepts/provenance/
23+
24+
grid_concepts_compliance:
2325
- title: FIPS
2426
description: Learn how Docker Hardened Images support FIPS 140 by using validated cryptographic modules and providing signed attestations for compliance audits.
2527
icon: verified
@@ -28,6 +30,10 @@ params:
2830
description: Learn how Docker Hardened Images provide STIG-hardened container images with verifiable security scan attestations for government and enterprise compliance requirements.
2931
icon: policy
3032
link: /dhi/core-concepts/stig/
33+
- title: CIS Benchmarks
34+
description: Learn how Docker Hardened Images help you meet Center for Internet Security (CIS) Docker Benchmark requirements for secure container configuration and deployment.
35+
icon: check_circle
36+
link: /dhi/core-concepts/cis/
3137

3238
grid_concepts_risk:
3339
- title: Common Vulnerabilities and Exposures (CVEs)
@@ -84,10 +90,15 @@ and VEX.
8490
Start here if you want to understand how Docker Hardened Images support compliance,
8591
transparency, and security.
8692

93+
8794
## Security metadata and attestations
8895

8996
{{< grid items="grid_concepts_metadata" >}}
9097

98+
## Compliance standards
99+
100+
{{< grid items="grid_concepts_compliance" >}}
101+
91102
## Vulnerability and risk management
92103

93104
{{< grid items="grid_concepts_risk" >}}
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
title: CIS Benchmark
3+
description: Learn how Docker Hardened Images comply with the CIS Docker Benchmark to help organizations harden container images for secure deployments.
4+
keywords: docker cis benchmark, cis docker compliance, cis docker images, docker hardened images, secure container images
5+
---
6+
7+
## What is the CIS Docker Benchmark?
8+
9+
The [CIS Docker Benchmark](https://www.cisecurity.org/benchmark/docker) is part
10+
of the globally recognized CIS Benchmarks, developed by the [Center for
11+
Internet Security (CIS)](https://www.cisecurity.org/). It defines recommended secure
12+
configurations for all aspects of the Docker container ecosystem, including the
13+
container host, Docker daemon, container images, and the container runtime.
14+
15+
## Why CIS Benchmark compliance matters
16+
17+
Following the CIS Docker Benchmark helps organizations:
18+
19+
- Reduce security risk with widely recognized hardening guidance.
20+
- Meet regulatory or contractual requirements that reference CIS controls.
21+
- Standardize image and Dockerfile practices across teams.
22+
- Demonstrate audit readiness with configuration decisions grounded in a public standard.
23+
24+
## How Docker Hardened Images comply with the CIS Benchmark
25+
26+
Docker Hardened Images (DHIs) are designed with security in mind and are
27+
verified to be compliant with the relevant controls from the latest CIS
28+
Docker Benchmark (v1.8.0) for the scope that applies to container images and
29+
Dockerfile configuration.
30+
31+
CIS-compliant DHIs are compliant with all controls in Section 4, with the sole
32+
exception of the control requiring Docker Content Trust (DCT), which [Docker
33+
officially retired](https://www.docker.com/blog/retiring-docker-content-trust/).
34+
By starting from a CIS-compliant DHI, teams can adopt image-level best practices
35+
from the benchmark more quickly and confidently.
36+
37+
> [!NOTE]
38+
>
39+
> The CIS Docker Benchmark also includes controls for the host, daemon, and
40+
> runtime. CIS-compliant DHIs address only the image and Dockerfile scope (Section
41+
> 4). Overall compliance still depends on how you configure and operate the
42+
> broader environment.
43+
44+
## Identify CIS-compliant images
45+
46+
CIS-compliant images are labeled as **CIS** in the Docker Hardened Images catalog.
47+
To find them, [explore images](../how-to/explore.md) and look for the **CIS**
48+
designation on individual listings.
49+
50+
## Get the benchmark
51+
52+
Download the latest CIS Docker Benchmark directly from CIS:
53+
https://www.cisecurity.org/benchmark/docker

0 commit comments

Comments
 (0)