File tree Expand file tree Collapse file tree
content/manuals/dhi/core-concepts Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -24,9 +24,9 @@ Following the CIS Docker Benchmark helps organizations:
2424## How Docker Hardened Images comply with the CIS Benchmark
2525
2626Docker Hardened Images (DHIs) are designed with security in mind and are
27- verified to be compliant with the relevant controls from the latest CIS
28- Docker Benchmark (v1.8.0) for the scope that applies to container images and
29- Dockerfile configuration.
27+ verified to be compliant with the relevant controls from the CIS Docker
28+ Benchmark for the scope that applies to container images and Dockerfile
29+ configuration.
3030
3131CIS-compliant DHIs are compliant with all controls in Section 4, with the sole
3232exception of the control requiring Docker Content Trust (DCT), which [ Docker
Original file line number Diff line number Diff line change @@ -160,9 +160,6 @@ $ docker scout vex get dhi.io/<image>:<tag> --output vex.json
160160
161161> [ !NOTE]
162162>
163- > The ` docker scout vex get ` command requires [ Docker Scout
164- > CLI] ( https://github.com/docker/scout-cli/ ) version 1.18.3 or later.
165- >
166163> If the image exists locally on your device, you must prefix the image name with ` registry:// ` . For example, use
167164> ` registry://dhi.io/python:3.13 ` instead of ` dhi.io/python:3.13 ` .
168165
Original file line number Diff line number Diff line change @@ -17,9 +17,9 @@ ensuring the integrity and security of these elements is paramount
1717
1818## Why is SSCS important?
1919
20- The significance of SSCS has escalated due to the rise in sophisticated
21- cyberattacks targeting software supply chains. Recent incidents and the
22- exploitation of vulnerabilities in open-source components have underscored the
20+ The significance of SSCS has escalated due to sophisticated cyberattacks
21+ targeting software supply chains. High-profile supply chain attacks and the
22+ exploitation of vulnerabilities in open-source components underscore the
2323critical need for robust supply chain security measures. Compromises at any
2424stage of the software lifecycle can lead to widespread vulnerabilities, data
2525breaches, and significant financial losses.
You can’t perform that action at this time.
0 commit comments