Skip to content

Commit fd27751

Browse files
dhi: update addtional resources and scanner integration (#24751)
<!--Delete sections as needed --> ## Description - Added new blogs and terraform repo to additional resources - Added mend.io integration Notable topics in preview: - https://deploy-preview-24751--docsdocker.netlify.app/dhi/explore/scanner-integrations/ - https://deploy-preview-24751--docsdocker.netlify.app/dhi/how-to/scan/#mendio - https://deploy-preview-24751--docsdocker.netlify.app/dhi/resources/ ## Related issues or tickets ENGDOCS-3236 ## Reviews <!-- Notes for reviewers here --> <!-- List applicable reviews (optionally @tag reviewers) --> - [ ] Editorial review - [ ] Product review --------- Signed-off-by: Craig Osterhout <craig.osterhout@docker.com>
1 parent f04e03e commit fd27751

File tree

4 files changed

+42
-6
lines changed

4 files changed

+42
-6
lines changed

_vale/config/vocabularies/Docker/accept.txt

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -337,6 +337,7 @@ Zsh
337337
[Vv]irtualize
338338
[Ww]alkthrough
339339
[Tt]oolsets?
340+
[Rr]eachability
340341
[Rr]erank(ing|ed)?
341342
[Ee]vals?
342343
[Ll]abspaces?

content/manuals/dhi/explore/scanner-integrations.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Scanner integrations
33
description: Learn which vulnerability scanners work with Docker Hardened Images and how to choose the right scanner for accurate vulnerability assessment.
4-
keywords: scanner integration, vulnerability scanning, docker scout, trivy, grype, container security scanners
4+
keywords: scanner integration, vulnerability scanning, docker scout, trivy, grype, mend.io, container security scanners
55
weight: 40
66
---
77

@@ -23,6 +23,9 @@ Hardened Images to deliver more accurate vulnerability assessments:
2323
flag for local VEX file processing.
2424
- [Wiz](https://www.wiz.io/): Automatically applies VEX statements with
2525
zero configuration.
26+
- [Mend.io](https://www.mend.io/): Automatically retrieves and applies VEX
27+
statements with zero configuration. Combines VEX data with reachability
28+
analysis.
2629

2730
For step-by-step instructions, see [Scan Docker Hardened Images](/manuals/dhi/how-to/scan.md).
2831

@@ -63,8 +66,8 @@ from Docker Hardened Images offer the following benefits:
6366
aren't flagged; security teams and compliance officers can review the reasoning
6467
rather than trusting a vendor's black box.
6568
- Scanner flexibility: Switch between any VEX-enabled scanner (Docker Scout,
66-
Trivy, Grype, etc.) without losing vulnerability context or rebuilding
67-
exclusion lists.
69+
Trivy, Grype, Wiz, Mend.io, etc.) without losing vulnerability context or
70+
rebuilding exclusion lists.
6871
- Consistent results: VEX-enabled scanners interpret the same data the
6972
same way, eliminating discrepancies between tools.
7073
- Faster workflows: Focus on real risks rather than researching why reported
@@ -96,7 +99,7 @@ The image includes signed attestations that explain which vulnerabilities don't
9699
apply and why. Any VEX-enabled scanner can read these attestations, giving you:
97100

98101
- Tool flexibility: Use any scanner that supports OpenVEX (Docker Scout,
99-
Trivy, Grype, Wiz, etc.)
102+
Trivy, Grype, Wiz, Mend.io, etc.)
100103
- Complete transparency: Review the exact reasoning for each vulnerability
101104
assessment
102105
- Full auditability: Security teams and compliance officers can independently

content/manuals/dhi/how-to/scan.md

Lines changed: 29 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Scan Docker Hardened Images
33
linktitle: Scan an image
4-
description: Learn how to scan Docker Hardened Images for known vulnerabilities using Docker Scout, Grype, Trivy, or Wiz.
5-
keywords: scan container image, docker scout cves, grype scanner, trivy container scanner, vex attestation
4+
description: Learn how to scan Docker Hardened Images for known vulnerabilities using Docker Scout, Grype, Trivy, Wiz, or Mend.io.
5+
keywords: scan container image, docker scout cves, grype scanner, trivy container scanner, mend.io, vex attestation
66
weight: 46
77
---
88

@@ -21,6 +21,8 @@ read and apply the VEX statements included with Docker Hardened Images:
2121
- [Grype](#grype): Supports VEX via the `--vex` flag
2222
- [Wiz](#wiz): Automatically applies VEX statements with
2323
zero configuration
24+
- [Mend.io](#mendio): Automatically applies VEX statements with
25+
zero configuration
2426

2527
For guidance on choosing the right scanner and understanding the differences
2628
between VEX-enabled and non-VEX scanners, see [Scanner
@@ -374,6 +376,31 @@ $ docker pull dhi.io/<image>:<tag>
374376
$ wizcli scan container-image dhi.io/<image>:<tag>
375377
```
376378

379+
## Mend.io
380+
381+
[Mend.io](https://www.mend.io/) is an application security platform that
382+
includes container image scanning with support for DHI VEX attestations.
383+
Mend Container automatically retrieves and applies VEX statements from Docker
384+
Hardened Images and combines them with Mend's reachability analysis for
385+
comprehensive vulnerability assessment.
386+
387+
### Scan a DHI using Mend.io
388+
389+
After acquiring a Mend.io subscription and configuring
390+
[Mend Container](https://docs.mend.io/container/latest/), Mend automatically
391+
detects Docker Hardened Images and applies their VEX data without requiring any
392+
additional configuration. When you scan a Docker Hardened Image through the Mend
393+
AppSec Platform, VEX statements are automatically retrieved and attached as risk
394+
factors to each finding.
395+
396+
You can view and filter DHI-specific findings in the Mend AppSec Platform under
397+
**Security > Containers > Packages**, where a Docker badge identifies hardened
398+
image packages. Use the **Risk Factors** column to filter by VEX statuses such
399+
as Not Affected, Fixed, or Under Investigation.
400+
401+
For more information, see the [Mend.io Docker Hardened Images
402+
documentation](https://docs.mend.io/platform/latest/docker-hardened-images).
403+
377404
## Export VEX attestations
378405

379406
For scanners that need local VEX files (like Grype or Trivy with local files),

content/manuals/dhi/resources.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ features, and announcements:
1919

2020
| Date published | Title |
2121
|------|-------|
22+
| April 14, 2026 | [Why We Chose the Harder Path: Docker Hardened Images, One Year Later](https://www.docker.com/blog/why-we-chose-the-harder-path-docker-hardened-images-one-year-later/) |
23+
| April 8, 2026 | [Reclaim Developer Hours through Smarter Vulnerability Prioritization with Docker and Mend.io](https://www.docker.com/blog/reclaim-developer-hours-through-smarter-vulnerability-prioritization-with-docker-and-mend-io/) |
2224
| March 3, 2026 | [Announcing Docker Hardened System Packages](https://www.docker.com/blog/announcing-docker-hardened-system-packages/) |
2325
| January 25, 2026 | [Making the Most of Your Docker Hardened Images Enterprise Trial - Part 3](https://www.docker.com/blog/making-the-most-of-your-docker-hardened-images-enterprise-trial-part-3/) |
2426
| January 24, 2026 | [Making the Most of Your Docker Hardened Images Enterprise Trial - Part 2](https://www.docker.com/blog/making-the-most-of-your-docker-hardened-images-enterprise-trial-part-2/) |
@@ -62,6 +64,9 @@ organization:
6264
digest) for Docker Hardened Images
6365
- [dhictl](https://github.com/docker-hardened-images/dhictl): Command-line
6466
interface for managing and interacting with Docker Hardened Images
67+
- [Terraform Provider](https://github.com/docker-hardened-images/terraform-provider-dhi):
68+
Terraform provider for managing DHI resources
69+
([Terraform Registry](https://registry.terraform.io/providers/docker-hardened-images/dhi/latest/docs))
6570
- [Discussions](https://github.com/orgs/docker-hardened-images/discussions):
6671
Community forum and product discussions
6772

0 commit comments

Comments
 (0)