Skip to content

Commit e8792f0

Browse files
Fix section on ECI limitations for Kubernetes. (#24713)
## Description Update the "Limitations" section for Enhanced Container Isolation (ECI) by removing text that no longer applies for all supported Docker Desktop releases. ## Reviews <!-- Notes for reviewers here --> <!-- List applicable reviews (optionally @tag reviewers) --> - [ ] Technical review - [X] Editorial review - [ ] Product review --------- Signed-off-by: Cesar Talledo <cesar.talledo@docker.com> Co-authored-by: Allie Sadler <102604716+aevesdocker@users.noreply.github.com>
1 parent b49c6c7 commit e8792f0

1 file changed

Lines changed: 5 additions & 12 deletions

File tree

  • content/manuals/enterprise/security/hardened-desktop/enhanced-container-isolation

content/manuals/enterprise/security/hardened-desktop/enhanced-container-isolation/limitations.md

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -69,31 +69,24 @@ $ docker buildx create --driver docker-container --use
6969
$ docker buildx build --network=host .
7070
```
7171

72-
## Docker Desktop Kubernetes not protected
72+
## Docker Desktop Kubernetes not protected in Kubeadm mode
7373

74-
The integrated Kubernetes feature doesn't benefit from ECI protection. Malicious or privileged pods can compromise the Docker Desktop VM and bypass security controls.
74+
The integrated Kubernetes feature, when used with the legacy Kubeadm provisioner, doesn't benefit from ECI protection. Malicious or privileged pods can compromise the Docker Desktop VM and bypass security controls.
7575

7676
### Recommendation
7777

78-
Use Kubernetes in Docker (KinD) for ECI-protected Kubernetes:
79-
80-
```console
81-
$ kind create cluster
82-
```
83-
84-
With ECI turned on, each Kubernetes node runs in an ECI-protected container, providing stronger isolation from the Docker Desktop VM.
78+
Use the newer Docker Desktop Kubernetes "KinD" provisioner (see [Cluster provisioning method](/manuals/desktop/use-desktop/kubernetes.md#cluster-provisioning-method)). In this mode, and with ECI turned on, each Kubernetes node runs in an ECI-protected container, providing stronger isolation from the Docker Desktop VM. The KinD provisioner is also faster and allows for multi-node Kubernetes clusters.
8579

8680
## Unprotected container types
8781

8882
These container types currently don't benefit from ECI protection:
8983

9084
- Docker Extensions: Extension containers run without ECI protection
91-
- Docker Debug: Docker Debug containers bypass ECI restrictions
92-
- Kubernetes pods: When using Docker Desktop's integrated Kubernetes
85+
- Kubernetes pods: When using Docker Desktop's integrated Kubernetes with the old Kubeadm provisioner.
9386

9487
### Recommendation
9588

96-
Only use extensions from trusted sources and avoid Docker Debug in security-sensitive environments.
89+
Only use extensions from trusted sources in security-sensitive environments.
9790

9891
## Global command restrictions
9992

0 commit comments

Comments
 (0)