You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/manuals/dhi/core-concepts/_index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ params:
27
27
icon: verified
28
28
link: /dhi/core-concepts/fips/
29
29
- title: STIG
30
-
description: Learn how Docker Hardened Images provide STIG-hardened container images with verifiable security scan attestations for government and enterprise compliance requirements.
30
+
description: Learn how Docker Hardened Images provide STIG-ready container images with verifiable security scan attestations for government and enterprise compliance requirements.
[CycloneDX](https://cyclonedx.org/), and [SLSA](https://slsa.dev/)) and are
22
-
attached to the image as OCI-compliant metadata. They can be generated
22
+
attached to the image or chart as OCI-compliant metadata. They can be generated
23
23
automatically during image builds or added manually to document extra tests,
24
24
scan results, or custom provenance.
25
25
@@ -38,25 +38,25 @@ They are essential for meeting industry standards such as SLSA,
38
38
and help teams reduce the risk of supply chain attacks by making build and
39
39
security data transparent and verifiable.
40
40
41
-
## How Docker Hardened Images use attestations
41
+
## How Docker Hardened Images and charts use attestations
42
42
43
-
All DHIs are built using [SLSA Build Level
43
+
All DHIs and charts are built using [SLSA Build Level
44
44
3](https://slsa.dev/spec/latest/levels) practices, and each image variant is
45
45
published with a full set of signed attestations. These attestations allow users
46
46
to:
47
47
48
-
- Verify that the image was built from trusted sources in a secure environment
48
+
- Verify that the image or chart was built from trusted sources in a secure environment
49
49
- View SBOMs in multiple formats to understand component-level details
50
50
- Review scan results to check for vulnerabilities or embedded secrets
51
51
- Confirm the build and deployment history of each image
52
52
53
-
Attestations are automatically published and associated with each mirrored DHI
54
-
in your Docker Hub organization. They can be inspected using tools like [Docker
53
+
Attestations are automatically published and associated with each DHI
54
+
and chart. They can be inspected using tools like [Docker
55
55
Scout](../how-to/verify.md) or
56
56
[Cosign](https://docs.sigstore.dev/cosign/overview), and are consumable by CI/CD
57
57
tooling or security platforms.
58
58
59
-
## Available attestations
59
+
## Image attestations
60
60
61
61
While every DHI variant includes a set of attestations, the attestations may
62
62
vary based on the image variant. For example, some images may include a STIG
@@ -82,10 +82,38 @@ details](../how-to/explore.md#view-image-variant-details) in Docker Hub.
82
82
| SLSA verification summary | A summary attestation indicating the image's compliance with SLSA requirements. |`https://slsa.dev/verification_summary/v1`|
83
83
| SPDX SBOM | An SBOM in [SPDX](https://spdx.dev/) format, widely adopted in open-source ecosystems. |`https://spdx.dev/Document`|
84
84
| FIPS compliance | An attestation that verifies the image uses FIPS 140-validated cryptographic modules. |`https://docker.com/dhi/fips/v0.1`|
85
+
| DHI Image Sources | Links to a corresponding source image containing all materials used to build the image, including package source code, git repos, and local files, ensuring compliance with open source license requirements. |`https://docker.com/dhi/source/v0.1`|
86
+
87
+
## Helm chart attestations
88
+
89
+
Docker Hardened Image (DHI) charts also include comprehensive signed attestations
90
+
that provide transparency and verification for your Kubernetes deployments. Like
91
+
DHI container images, these charts are built following SLSA Build Level 3
92
+
practices and include extensive security metadata.
93
+
94
+
DHI Helm charts include the following attestations:
95
+
96
+
| Attestation type | Description | Predicate type URI |
| CycloneDX SBOM | A software bill of materials in [CycloneDX](https://cyclonedx.org/) format, listing the chart itself and all container images and tools referenced by the chart. |`https://cyclonedx.org/bom/v1.6`|
99
+
| CVEs (In-Toto format) | A list of known vulnerabilities (CVEs) affecting the container images and components referenced by the chart. |`https://in-toto.io/attestation/vulns/v0.1`|
100
+
| Scout health score | A signed attestation from Docker Scout that summarizes the overall security and quality posture of the chart and its referenced images. |`https://scout.docker.com/health/v0.1`|
101
+
| Scout provenance | Provenance metadata generated by Docker Scout, including the chart source repository, build images used, and build parameters. |`https://scout.docker.com/provenance/v0.1`|
102
+
| Scout SBOM | An SBOM generated and signed by Docker Scout, including the chart and container images it references, with additional Docker-specific metadata. |`https://scout.docker.com/sbom/v0.1`|
103
+
| Secrets scan | Results of a scan for accidentally included secrets, such as credentials, tokens, or private keys, in the chart package. |`https://scout.docker.com/secrets/v0.1`|
104
+
| Tests | A record of automated tests run against the chart to validate functionality and compatibility with referenced images. |`https://scout.docker.com/tests/v0.1`|
105
+
| Virus scan | Results of antivirus scans performed on the chart package. |`https://scout.docker.com/virus/v0.1`|
106
+
| CVEs (Scout format) | A vulnerability report generated by Docker Scout, listing known CVEs and severity data for the chart's referenced images. |`https://scout.docker.com/vulnerabilities/v0.1`|
107
+
| SLSA provenance | A standard [SLSA](https://slsa.dev/) provenance statement describing how the chart was built, including build tool, source repository, referenced images, and build materials. |`https://slsa.dev/provenance/v0.2`|
108
+
| SPDX SBOM | An SBOM in [SPDX](https://spdx.dev/) format, listing the chart and all container images and tools it references. |`https://spdx.dev/Document`|
109
+
110
+
For instructions on how to view and verify Helm chart attestations, see [Verify
description: Learn how Docker Hardened Images support FIPS 140 through validated cryptographic modules to help organizations meet compliance requirements.
4
5
keywords: docker fips, fips 140 images, fips docker images, docker compliance, secure container images
0 commit comments