ããŒããã³ã°ãããã»ãã¥ã¢ã€ã¡ãŒãž
Docker Hardened ImagesïŒDHIïŒã¯ãã³ã³ããåãããã¢ããªã±ãŒã·ã§ã³ã«å¯ŸããŠå ç¢ãªã»ãã¥ãªãã£åºç€ãæäŸããããèšèšãããŠãããé²åãç¶ãããœãããŠã§ã¢ãµãã©ã€ãã§ãŒã³ã®ã»ãã¥ãªãã£èª²é¡ã«å¯Ÿå¿ããŠããŸãã
ã»ãŒãŒãã®è匱æ§ãšé root å®è¡
å DHI ã¯ãæ¢ç¥ã®è匱æ§ãæé€ããããã«å ¥å¿µã«æ§ç¯ãããŠãããç¶ç¶çãªã¹ãã£ã³ãšæŽæ°ã«ãã£ãŠ CVEïŒCommon Vulnerabilities and ExposuresïŒå ±éè匱æ§èå¥åïŒãã»ãŒãŒãã«æããŠããŸãã
ãŸããæå°æš©éã®ååã«åŸããDHI ã¯ããã©ã«ãã§é root ãŠãŒã¶ãŒãšããŠå®è¡ãããæ¬çªç°å¢ã«ãããç¹æš©ææ Œæ»æã®ãªã¹ã¯ãäœæžããŸãã
ãµãã©ã€ãã§ãŒã³ã»ãã¥ãªãã£ã®å æ¬çãªå¯Ÿç
DHI ã«ã¯ãä¿¡é Œæ§ãšéææ§ã確ä¿ããããã®è€æ°ã®ã»ãã¥ãªãã£ã¡ã¿ããŒã¿ãçµã¿èŸŒãŸããŠããŸãïŒ
-
SLSA Level 3 æºæ : åã€ã¡ãŒãžã«ã¯è©³çްãªãã«ãããããã³ã¹ïŒç±æ¥æ å ±ïŒãå«ãŸããŠãããSLSAïŒSupply-chain Levels for Software ArtifactsïŒãã¬ãŒã ã¯ãŒã¯ã®èŠä»¶ãæºãããŠããŸãã
-
SBOMïŒãœãããŠã§ã¢éšå衚ïŒ: ã€ã¡ãŒãžå ã®ãã¹ãŠã®ã³ã³ããŒãã³ãã詳现ã«èšèŒãã SBOM ãæäŸãããè匱æ§ç®¡çãã³ã³ãã©ã€ã¢ã³ã¹ç£æ»ãæ¯æŽããŸãã
-
VEXïŒVulnerability Exploitability eXchangeïŒææž: åã€ã¡ãŒãžã«ã¯ VEX ããã¥ã¡ã³ããæ·»ä»ãããŠãããæ¢ç¥ã®è匱æ§ã«é¢ããæ å ±ãšãã®æªçšå¯èœæ§ã«é¢ããã³ã³ããã¹ããæäŸãããŸãã
-
æå·çœ²åãšã¢ãã¹ããŒã·ã§ã³: ãã¹ãŠã®ã€ã¡ãŒãžããã³é¢é£ã¡ã¿ããŒã¿ã¯æå·çã«çœ²åãããŠãããå®å šæ§ãšæ£åœæ§ãä¿èšŒããŸãã
ãããã«ãã€éçºè ãã¬ã³ããªãŒãªããªã¢ã³ã
DHI ã«ã¯ãæå°æ§æãšéçºè åãã®äž¡ããªã¢ã³ããçšæãããŠããŸãïŒ
-
ãããã«ã€ã¡ãŒãž: distroless ã¢ãããŒãã«åºã¥ããŠæ§ç¯ãããŠãããäžèŠãªã³ã³ããŒãã³ããæé€ããããšã§ãæ»æå¯Ÿè±¡é åãæå€§ 95% åæžããèµ·åæéãé«éåããŸãã
-
éçºçšã€ã¡ãŒãž: å¿ èŠãªéçºããŒã«ãã©ã€ãã©ãªãå«ãŸããŠãããå®å šãªç°å¢ã§ã®ã¢ããªã±ãŒã·ã§ã³ã®ãã«ããšãã¹ããå¯èœã«ããŸãã