Skip to content

Commit 0d5bbe6

Browse files
dhi: update fips attestation (#23163)
<!--Delete sections as needed --> ## Description Updated the DHI FIPS topic to get the FIPS attestation instead of the FIPS tests from the test attestation. Added FIPS attestation to attestation table. https://deploy-preview-23163--docsdocker.netlify.app/dhi/core-concepts/fips/#view-the-fips-attestation https://deploy-preview-23163--docsdocker.netlify.app/dhi/core-concepts/attestations/#available-attestations ## Related issues or tickets ENGDOCS-2876 ## Reviews <!-- Notes for reviewers here --> <!-- List applicable reviews (optionally @tag reviewers) --> - [ ] Editorial review - [ ] Product review Signed-off-by: Craig <[email protected]>
1 parent 158aa8e commit 0d5bbe6

File tree

2 files changed

+28
-24
lines changed

2 files changed

+28
-24
lines changed

content/manuals/dhi/core-concepts/attestations.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,9 @@ tooling or security platforms.
6161
While every DHI variant includes a set of attestations, the attestations may
6262
vary based on the image variant. For example, some images may include a STIG
6363
scan attestation. The following table is a comprehensive list of all
64-
attestations that may be included with a DHI:
64+
attestations that may be included with a DHI. To see which attestations are
65+
available for a specific image variant, you can [view the image variant
66+
details](../how-to/explore.md#view-image-variant-details) in Docker Hub.
6567

6668
| Attestation type | Description | Predicate type URI |
6769
|----------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------|
@@ -79,6 +81,7 @@ attestations that may be included with a DHI:
7981
| SLSA provenance | A standard [SLSA](https://slsa.dev/) provenance statement describing how the image was built, including build tool, parameters, and source. | `https://slsa.dev/provenance/v0.2` |
8082
| SLSA verification summary | A summary attestation indicating the image's compliance with SLSA requirements. | `https://slsa.dev/verification_summary/v1` |
8183
| SPDX SBOM | An SBOM in [SPDX](https://spdx.dev/) format, widely adopted in open-source ecosystems. | `https://spdx.dev/Document` |
84+
| FIPS compliance | An attestation that verifies the image uses FIPS 140-validated cryptographic modules. | `https://docker.com/dhi/fips/v0.1` |
8285

8386
## View and verify attestations
8487

content/manuals/dhi/core-concepts/fips.md

Lines changed: 24 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -67,42 +67,43 @@ These indicators help you quickly locate repositories that support FIPS-based
6767
compliance needs. Image variants that include FIPS support will have a tag
6868
ending with `-fips`, such as `3.13-fips`.
6969

70-
## Validate FIPS-related tests using attestations
70+
## View the FIPS attestation
7171

72-
Docker Hardened Images include a signed [test
73-
attestation](../core-concepts/attestations.md) that documents the results of
74-
automated image validation. For FIPS variants, this includes test cases that
75-
verify whether the image uses FIPS-validated cryptographic modules.
72+
The FIPS variants of Docker Hardened Images contain a FIPS attestation that
73+
lists the actual cryptographic modules included in the image.
7674

77-
You can retrieve and inspect this attestation using the Docker Scout CLI:
75+
You can retrieve and inspect the FIPS attestation using the Docker Scout CLI:
7876

7977
```console
8078
$ docker scout attest get \
81-
--predicate-type https://scout.docker.com/tests/v0.1 \
79+
--predicate-type https://docker.com/dhi/fips/v0.1 \
8280
--predicate \
83-
<your-namespace>/dhi-<image>:<tag> --platform <platform>
81+
<your-namespace>/dhi-<image>:<tag>
8482
```
8583

8684
For example:
8785

8886
```console
8987
$ docker scout attest get \
90-
--predicate-type https://scout.docker.com/tests/v0.1 \
88+
--predicate-type https://docker.com/dhi/fips/v0.1 \
9189
--predicate \
92-
docs/dhi-python:3.13-fips --platform linux/amd64
90+
docs/dhi-python:3.13-fips
9391
```
9492

95-
The output is a structured JSON report. Individual test outputs are
96-
base64-encoded under fields like `stdout`. You can decode them to review the raw
97-
test output.
98-
99-
To decode and view test results:
100-
101-
```console
102-
$ docker scout attest get \
103-
--predicate-type https://scout.docker.com/tests/v0.1 \
104-
--predicate \
105-
docs/dhi-python:3.13-fips --platform linux/amd64 \
106-
| jq -r '.results.tests[].extra.stdout' \
107-
| base64 -d
93+
The attestation output is a JSON array describing the cryptographic modules
94+
included in the image and their compliance status. For example:
95+
96+
```json
97+
[
98+
{
99+
"certification": "CMVP #4985",
100+
"certificationUrl": "https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4985",
101+
"name": "OpenSSL FIPS Provider",
102+
"package": "pkg:dhi/[email protected]",
103+
"standard": "FIPS 140-3",
104+
"status": "active",
105+
"sunsetDate": "2030-03-10",
106+
"version": "3.1.2"
107+
}
108+
]
108109
```

0 commit comments

Comments
 (0)