-
Notifications
You must be signed in to change notification settings - Fork 8.1k
dhi: add stig #23114
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
dhi: add stig #23114
Changes from 3 commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,123 @@ | ||
| --- | ||
| title: STIG | ||
| description: Learn how Docker Hardened Images provide STIG-compliant container images with verifiable security scan attestations for government and enterprise compliance requirements. | ||
|
Check warning on line 3 in content/manuals/dhi/core-concepts/stig.md
|
||
| keywords: docker stig, stig-hardened images, stig guidance, openscap docker, secure container images | ||
|
Check failure on line 4 in content/manuals/dhi/core-concepts/stig.md
|
||
| --- | ||
|
|
||
| ## What is STIG? | ||
|
Check warning on line 7 in content/manuals/dhi/core-concepts/stig.md
|
||
|
|
||
| [Security Technical Implementation Guides | ||
| (STIGs)](https://public.cyber.mil/stigs/) are configuration standards published | ||
| by the U.S. Defense Information Systems Agency (DISA). They define security | ||
| requirements for operating systems, applications, databases, and other | ||
| technologies used in U.S. Department of Defense (DoD) environments. | ||
|
|
||
| STIGs help ensure that systems are configured securely and consistently to | ||
| reduce vulnerabilities. They are often based on broader requirements like the | ||
| DoD's General Purpose Operating System Security Requirements Guide (GPOS SRG). | ||
|
Check warning on line 17 in content/manuals/dhi/core-concepts/stig.md
|
||
|
|
||
| ## Why STIG guidance matters | ||
|
Check warning on line 19 in content/manuals/dhi/core-concepts/stig.md
|
||
|
|
||
| Following STIG guidance is critical for organizations that work with or support | ||
|
Check warning on line 21 in content/manuals/dhi/core-concepts/stig.md
|
||
| U.S. government systems. It demonstrates alignment with DoD security standards | ||
| and helps: | ||
|
|
||
| - Accelerate Authority to Operate (ATO) processes for DoD systems | ||
| - Reduce the risk of misconfiguration and exploitable weaknesses | ||
|
Check failure on line 26 in content/manuals/dhi/core-concepts/stig.md
|
||
| - Simplify audits and reporting through standardized baselines | ||
|
|
||
| Even outside of federal environments, STIGs are used by security-conscious | ||
| organizations as a benchmark for hardened system configurations. | ||
|
|
||
| STIGs are derived from broader NIST guidance, particularly [NIST Special | ||
|
Check warning on line 32 in content/manuals/dhi/core-concepts/stig.md
|
||
| Publication 800-53](https://csrc.nist.gov/publications/sp800), which defines a | ||
| catalog of security and privacy controls for federal systems. Organizations | ||
| pursuing compliance with 800-53 or related frameworks (such as FedRAMP) can use | ||
| STIGs as implementation guides that help meet applicable control requirements. | ||
|
|
||
| ## How Docker Hardened Images help apply STIG guidance | ||
|
|
||
| Docker Hardened Images (DHIs) include STIG variants that are scanned against | ||
| custom STIG-based profiles and include signed STIG scan attestations. These | ||
| attestations can support audits and compliance reporting. | ||
|
|
||
| Docker creates custom STIG-based profiles for images based on the GPOS SRG and | ||
| DoD Container Hardening Process Guide. Because DISA has not published a STIG | ||
| specifically for containers, these profiles help apply STIG-like guidance to | ||
| container environments in a consistent, reviewable way and are designed to | ||
| reduce false positives common in container images. | ||
|
|
||
| ## Identify images that include STIG scan results | ||
|
|
||
| Docker Hardened Images that include STIG scan results are labeled as **STIG** in | ||
| the Docker Hardened Images catalog. | ||
|
|
||
| To find DHI repositories with STIG image variants, [explore | ||
| images](../how-to/explore.md) and: | ||
|
|
||
| - Use the **STIG** filter on the catalog page | ||
| - Look for **STIG** labels on individual image listings | ||
|
|
||
| To find a STIG image variant within a repository, go to the **Tags** tab in the | ||
| repository, and find images labeled with **STIG** in the **Compliance** column. | ||
|
|
||
| ## View and verify STIG scan results | ||
|
|
||
| Docker provides a signed [STIG scan | ||
| attestation](../core-concepts/attestations.md) for each STIG-hardened image. | ||
| These attestations include: | ||
|
|
||
| - A summary of the scan results, including the number of passed, failed, and not | ||
| applicable checks | ||
| - The name and version of the STIG profile used | ||
| - Full output in both HTML and XCCDF (XML) formats | ||
|
|
||
| ### View STIG scan attestations | ||
|
|
||
| You can retrieve and inspect a STIG scan attestation using the Docker Scout CLI: | ||
|
|
||
| ```console | ||
| $ docker scout attest get \ | ||
| --predicate-type https://docker.com/dhi/stig/v0.1 \ | ||
| --verify \ | ||
| --predicate \ | ||
| <your-namespace>/dhi-<image>:<tag> | ||
| ``` | ||
|
|
||
| ### Extract HTML report | ||
|
|
||
| To extract and view the human-readable HTML report: | ||
|
|
||
| ```console | ||
| $ docker scout attest get <your-namespace>/dhi-<image>:<tag> \ | ||
| --predicate-type https://docker.com/dhi/stig/v0.1 \ | ||
| --verify \ | ||
| --predicate \ | ||
| | jq -r '.[0].output[0].content | @base64d' > stig_report.html | ||
| ``` | ||
|
|
||
| ### Extract XCCDF report | ||
|
|
||
| To extract the XML (XCCDF) report for integration with other tools: | ||
|
|
||
| ```console | ||
| $ docker scout attest get <your-namespace>/dhi-<image>:<tag> \ | ||
| --predicate-type https://docker.com/dhi/stig/v0.1 \ | ||
| --verify \ | ||
| --predicate \ | ||
| | jq -r '.[0].output[1].content | @base64d' > stig_report.xml | ||
craig-osterhout marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| ``` | ||
|
|
||
| ### View STIG scan summary | ||
|
|
||
| To view just the scan summary without the full reports: | ||
|
|
||
| ```console | ||
| $ docker scout attest get <your-namespace>/dhi-<image>:<tag> \ | ||
| --predicate-type https://docker.com/dhi/stig/v0.1 \ | ||
| --verify \ | ||
| --predicate \ | ||
| | jq -r '.[0] | del(.output)' | ||
| ``` | ||
|
|
||
|
|
||
Uh oh!
There was an error while loading. Please reload this page.