Skip to content

Commit 27e529c

Browse files
authored
Update content_trust.md
Make it clear that DCT does not protect against layer tampering on the docker host.
1 parent 0d5ded5 commit 27e529c

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

engine/security/trust/content_trust.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ client-side or runtime verification of the integrity and publisher of specific
2020
image tags.
2121

2222
Through DCT, image publishers can sign their images and image consumers can
23-
ensure that the images they use are signed. Publishers could be individuals
23+
ensure that the images they pull are signed. Publishers could be individuals
2424
or organizations manually signing their content or automated software supply
2525
chains signing content as part of their release process.
2626

@@ -244,9 +244,9 @@ Engine Signature Verification prevents the following:
244244
245245
DCT does not verify that a running container’s filesystem has not been altered
246246
from what was in the image. For example, it does not prevent a container from
247-
writing to the filesystem, once the container is running, nor does it prevent
248-
the container’s filesystem from being altered on disk. DCT will also not prevent
249-
unsigned images from being imported, loaded, or created.
247+
writing to the filesystem, once the container is running. Moreover, it does not
248+
prevent the image's filesystem from being altered on a docker host's disk. DCT
249+
will also not prevent unsigned images from being imported, loaded, or created.
250250

251251
### Enabling DCT within the Docker Enterprise Engine
252252

0 commit comments

Comments
 (0)