You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/manuals/dhi/core-concepts/attestations.md
+15Lines changed: 15 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -90,6 +90,21 @@ For more details, see [Verify image attestations](../how-to/verify.md#verify-ima
90
90
| FIPS compliance | An attestation that verifies the image uses FIPS 140-validated cryptographic modules. |
91
91
| DHI Image Sources | Links to a corresponding source image containing all materials used to build the image, including package source code, Git repositories, and local files, ensuring compliance with open source license requirements. |
92
92
93
+
## Package attestations
94
+
95
+
In addition to image-level attestations, Docker hardened packages also include
96
+
their own attestations. These package-level attestations provide provenance and
97
+
build information for individual packages within an image, allowing you to
98
+
trace the supply chain at a granular level.
99
+
100
+
Package attestations include similar information as image attestations, such as
101
+
SLSA provenance, showing how each package was built and what materials were
102
+
used. You can extract package information from an image's attestations and then
103
+
retrieve the package's own attestations recursively.
104
+
105
+
For detailed instructions on how to access and verify package attestations, see
description: Learn how Docker Hardened Images support FIPS 140 through validated cryptographic modules to help organizations meet compliance requirements.
5
5
keywords: docker fips, fips 140 images, fips docker images, docker compliance, secure container images
@@ -39,7 +39,7 @@ Using software components that rely on validated cryptographic modules can help
39
39
## How Docker Hardened Images support FIPS compliance
40
40
41
41
While Docker Hardened Images are available to all, the FIPS variant requires a
42
-
Docker Hardened Images Enterprise subscription.
42
+
paid Docker Hardened Images subscription.
43
43
44
44
Docker Hardened Images (DHIs) include variants that use cryptographic modules
45
45
validated under FIPS 140. These images are intended to help organizations meet
description: Learn how Docker Hardened Images provide STIG-ready container images with verifiable security scan attestations for government and enterprise compliance requirements.
Copy file name to clipboardExpand all lines: content/manuals/dhi/explore/available.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,6 +12,9 @@ Docker Hardened Images (DHI) is a comprehensive catalog of
12
12
security-hardened container images built to meet diverse
13
13
development and production needs.
14
14
15
+
You can explore the DHI catalog on [Docker Hub](https://hub.docker.com/search?q=&image_filter=store%2Cdhi) or use the [DHI CLI](../how-to/cli.md) to browse
16
+
available images, tags, and metadata from the command line.
17
+
15
18
## Framework and application images
16
19
17
20
DHI includes a selection of popular frameworks and application images, each
@@ -76,7 +79,7 @@ For example, you might find tags like the following in a DHI repository:
76
79
-`3.9.23-debian12`: runtime image for Python 3.9.23
77
80
-`3.9.23-debian12-dev`: development image for Python 3.9.23
78
81
79
-
## FIPs and STIG variants {tier="DHI Enterprise"}
82
+
## FIPs and STIG variants {tier="DHI Select & Enterprise"}
0 commit comments