From aca1285b6150f1f0006f6e1b420679e19c15d788 Mon Sep 17 00:00:00 2001 From: Allie Sadler <102604716+aevesdocker@users.noreply.github.com> Date: Mon, 14 Nov 2022 13:14:14 +0000 Subject: [PATCH] Eci patch 2 (#16152) * correct outdated eci information * move IAM into Hardened Desktop --- _data/toc.yaml | 2 ++ assets/images/image-access.svg | 1 + .../enhanced-container-isolation/index.md | 2 +- desktop/hardened-desktop/index.md | 23 +++++++++++++++---- .../settings-management/index.md | 4 ++-- 5 files changed, 24 insertions(+), 8 deletions(-) create mode 100644 assets/images/image-access.svg diff --git a/_data/toc.yaml b/_data/toc.yaml index 373157db3d..08b02756da 100644 --- a/_data/toc.yaml +++ b/_data/toc.yaml @@ -1297,6 +1297,8 @@ manuals: title: FAQs and known issues - path: /desktop/hardened-desktop/registry-access-management/ title: Registry Access Management + - path: /docker-hub/image-access-management/ + title: Image Access Management - sectiontitle: Dev Environments (Beta) section: - path: /desktop/dev-environments/ diff --git a/assets/images/image-access.svg b/assets/images/image-access.svg new file mode 100644 index 0000000000..cb28526f87 --- /dev/null +++ b/assets/images/image-access.svg @@ -0,0 +1 @@ + \ No newline at end of file diff --git a/desktop/hardened-desktop/enhanced-container-isolation/index.md b/desktop/hardened-desktop/enhanced-container-isolation/index.md index 6756887301..fd45d6b0c2 100644 --- a/desktop/hardened-desktop/enhanced-container-isolation/index.md +++ b/desktop/hardened-desktop/enhanced-container-isolation/index.md @@ -31,7 +31,7 @@ Enhanced Container Isolation helps ensure strong container isolation and also lo ### What happens when Enhanced Container Isolation is enabled? -When Enhanced Container Isolation is enabled using [Settings Management](../settings-management/index.md), the following features are enabled: +When Enhanced Container Isolation is turned on, the following features are enabled: - All user containers are automatically run in Linux User Namespaces which ensures stronger isolation. - The root user in the container maps to an unprivileged user at VM level. diff --git a/desktop/hardened-desktop/index.md b/desktop/hardened-desktop/index.md index f0ce2b0ce4..3ab1563b36 100644 --- a/desktop/hardened-desktop/index.md +++ b/desktop/hardened-desktop/index.md @@ -1,7 +1,7 @@ --- title: Hardened Desktop description: Overview of what Hardened Desktop is -keywords: security, hardened desktop, enhanced container isolation, registry access management, admin controls, root access, admins, docker desktop +keywords: security, hardened desktop, enhanced container isolation, registry access management, settings management root access, admins, docker desktop, image access management --- >Note > @@ -17,13 +17,14 @@ Hardened Desktop includes: - Settings Management, which helps admins to confidently manage and control the usage of Docker Desktop within their organization. - Enhanced Container Isolation, a setting that instantly enhances security by preventing containers from running as root in Docker Desktop’s Linux VM and ensures that any configurations set using Settings Management, cannot be modified by containers. - Registry Access Management, which allows admins to control the registries developers can access. +- Image Access Management, which gives admins control over which images developers can pull from Docker Hub. Docker plans to continue adding more security enhancements to the Hardened Desktop security model.
Control the images developers can pull from Docker Hub.
+