Skip to content

Commit 3709b9b

Browse files
Merge branch 'main' into ENGDOCS-2281
2 parents 5db7f4d + 00e3c8b commit 3709b9b

File tree

38 files changed

+292
-203
lines changed

38 files changed

+292
-203
lines changed

_vale/Docker/Acronyms.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ exceptions:
3131
- DPI
3232
- DSOS
3333
- DVP
34+
- ECI
3435
- ELK
3536
- FAQ
3637
- FUSE
@@ -60,13 +61,15 @@ exceptions:
6061
- LTS
6162
- MAC
6263
- MDM
64+
- MDN
6365
- NAT
6466
- NET
6567
- NFS
6668
- NOTE
6769
- NTLM
6870
- NVDA
6971
- OCI
72+
- OS
7073
- OSS
7174
- PATH
7275
- PDF
@@ -90,6 +93,7 @@ exceptions:
9093
- SDK
9194
- SLES
9295
- SLSA
96+
- SOCKS
9397
- SPDX
9498
- SQL
9599
- SSD

_vale/Docker/RecommendedWords.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ swap:
1414
(?:sign on|log on|log in|logon|login): sign in
1515
above: previous
1616
adaptor: adapter
17-
admin: administrator
17+
admin(?! console): administrator
1818
administrate: administer
1919
afterwards: afterward
2020
allow: let

_vale/config/vocabularies/Docker/accept.txt

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
(?-i)[A-Z]{2,}s
2-
Admin Console
32
Amazon
43
Anchore
54
Apple
@@ -108,6 +107,7 @@ Zsh
108107
[Mm]oby
109108
[Oo]nboarding
110109
[Pp]aravirtualization
110+
[Pp]roxied
111111
[Pp]roxying
112112
[Rr]eal-time
113113
[Rr]untimes?
@@ -156,5 +156,6 @@ tmpfs
156156
ufw
157157
umask
158158
ungated
159+
untrusted
159160
vSphere
160161
vpnkit

content/get-started/docker-concepts/building-images/multi-stage-builds.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,8 @@ In this hands-on guide, you'll unlock the power of multi-stage builds to create
5757

5858
1. [Download and install](https://www.docker.com/products/docker-desktop/) Docker Desktop.
5959

60-
2. [Download and install](https://www.oracle.com/java/technologies/downloads/) Java.
6160

62-
3. Open this [pre-initialized project](https://start.spring.io/#!type=maven-project&language=java&platformVersion=3.4.0-M3&packaging=jar&jvmVersion=21&groupId=com.example&artifactId=spring-boot-docker&name=spring-boot-docker&description=Demo%20project%20for%20Spring%20Boot&packageName=com.example.spring-boot-docker&dependencies=web) to generate a ZIP file. Here’s how that looks:
61+
2. Open this [pre-initialized project](https://start.spring.io/#!type=maven-project&language=java&platformVersion=3.4.0-M3&packaging=jar&jvmVersion=21&groupId=com.example&artifactId=spring-boot-docker&name=spring-boot-docker&description=Demo%20project%20for%20Spring%20Boot&packageName=com.example.spring-boot-docker&dependencies=web) to generate a ZIP file. Here’s how that looks:
6362

6463

6564
![A screenshot of Spring Initializr tool selected with Java 21, Spring Web and Spring Boot 3.4.0](images/multi-stage-builds-spring-initializer.webp?border=true)
@@ -72,7 +71,7 @@ In this hands-on guide, you'll unlock the power of multi-stage builds to create
7271
For this demonstration, you’ve paired Maven build automation with Java, a Spring Web dependency, and Java 21 for your metadata.
7372

7473

75-
4. Navigate the project directory. Once you unzip the file, you'll see the following project directory structure:
74+
3. Navigate the project directory. Once you unzip the file, you'll see the following project directory structure:
7675

7776

7877
```plaintext
@@ -109,7 +108,7 @@ In this hands-on guide, you'll unlock the power of multi-stage builds to create
109108
contains most of the information needed to build a customized project. The POM is huge and can seem
110109
daunting. Thankfully, you don't yet need to understand every intricacy to use it effectively.
111110
112-
5. Create a RESTful web service that displays "Hello World!".
111+
4. Create a RESTful web service that displays "Hello World!".
113112
114113
115114
Under the `src/main/java/com/example/spring_boot_docker/` directory, you can modify your

content/guides/docker-scout/_index.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,16 +14,14 @@ aliases:
1414
params:
1515
featured: true
1616
image: images/learning-paths/scout.png
17-
time: 10 minutes
17+
time: 20 minutes
1818
resource_links:
1919
- title: Docker Scout overview
2020
url: /scout/
2121
- title: Docker Scout quickstart
2222
url: /scout/quickstart/
2323
- title: Install Docker Scout
2424
url: /scout/install/
25-
- title: Software Bill of Materials
26-
url: /scout/concepts/sbom/
2725
---
2826

2927
When container images are insecure, significant risks can arise. Around 60% of
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Attestations
3+
keywords: build, attestations, sbom, provenance, metadata
4+
description: |
5+
Introduction to SBOM and provenance attestations with Docker Build,
6+
what they are, and why they exist
7+
weight: 50
8+
---
9+
10+
{{< youtube-embed qOzcycbTs4o >}}
11+
12+
[Build attestations](/manuals/build/metadata/attestations/_index.md) give you
13+
detailed information about how an image was built and what it contains. These
14+
attestations, generated by BuildKit during build-time, attach to the final
15+
image as metadata, allowing you to inspect an image to see its origin, creator,
16+
and contents. This information helps you make informed decisions about the
17+
security and impact of the image on your supply chain.
18+
19+
Docker Scout uses these attestations to evaluate the image's security and
20+
supply chain posture, and to provide remediation recommendations for issues. If
21+
issues are detected, such as missing or outdated attestations, Docker Scout can
22+
guide you on how to add or update them, ensuring compliance and improving
23+
visibility into the image's security status.
24+
25+
There are two key types of attestations:
26+
27+
- SBOM, which lists the software artifacts within the image.
28+
- Provenance, which details how the image was built.
29+
30+
You can create attestations by using `docker buildx build` with the
31+
`--provenance` and `--sbom` flags. Attestations attach to the image index,
32+
allowing you to inspect them without pulling the entire image. Docker Scout
33+
leverages this metadata to give you more precise recommendations and better
34+
control over your image's security.
35+
36+
<div id="scout-lp-survey-anchor"></div>

content/guides/docker-scout/common-questions.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
---
22
title: Common challenges and questions
33
description: Explore common challenges and questions related to Docker Scout.
4-
weight: 30
54
---
65

76
<!-- vale Docker.HeadingLength = NO -->

content/guides/docker-scout/demo.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,12 @@
11
---
22
title: Docker Scout demo
3+
linkTitle: Demo
34
description: Learn about Docker Scout's powerful features for enhanced supply chain security.
45
weight: 20
56
---
67

8+
{{< youtube-embed "TkLwJ0p46W8" >}}
9+
710
Docker Scout has powerful features for enhancing containerized application
811
security and ensuring a robust software supply chain.
912

@@ -15,6 +18,4 @@ security and ensuring a robust software supply chain.
1518
removing unnecessary packages
1619
- Verify and validate remediation efforts using Docker Scout
1720

18-
{{< youtube-embed "TkLwJ0p46W8" >}}
19-
2021
<div id="scout-lp-survey-anchor"></div>
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
title: Remediation
3+
description: Learn how Docker Scout can help you improve your software quality automatically, using remediation
4+
keywords: scout, supply chain, security, remediation, automation
5+
weight: 60
6+
---
7+
8+
{{< youtube-embed jM9zLBf8M-8 >}}
9+
10+
Docker Scout's [remediation feature](/manuals/scout/policy/remediation.md)
11+
helps you address supply chain and security issues by offering tailored
12+
recommendations based on policy evaluations. These recommendations guide you in
13+
improving policy compliance or enhancing image metadata, allowing Docker Scout
14+
to perform more accurate evaluations in the future.
15+
16+
You can use this feature to ensure that your base images are up-to-date and
17+
that your supply chain attestations are complete. When a violation occurs,
18+
Docker Scout provides recommended fixes, such as updating your base image or
19+
adding missing attestations. If there isn’t enough information to determine
20+
compliance, Docker Scout suggests actions to help resolve the issue.
21+
22+
In the Docker Scout Dashboard, you can view and act on these recommendations by
23+
reviewing violations or compliance uncertainties. With integrations like
24+
GitHub, you can even automate updates, directly fixing issues from the
25+
dashboard.
26+
27+
<div id="scout-lp-survey-anchor"></div>

content/manuals/scout/concepts/s3c.md renamed to content/guides/docker-scout/s3c.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,13 @@
22
title: Software supply chain security
33
description: Learn about software supply chain security (S3C), what it means, and why it is important.
44
keywords: docker scout, secure, software, supply, chain, security, sssc, sscs, s3c
5+
aliases:
6+
- /scout/concepts/s3c/
7+
weight: 30
58
---
69

10+
{{< youtube-embed YzNK6E7APv0 >}}
11+
712
The term "software supply chain" refers to the end-to-end process of developing
813
and delivering software, from the development to deployment and maintenance.
914
Software supply chain security, or "S3C" for short, is the practice for
@@ -39,7 +44,7 @@ day where software is built using multiple components from different sources.
3944
Organizations need to have a clear understanding of the software components
4045
they use, and the security risks associated with them.
4146

42-
## Docker Scout
47+
## How Docker Scout is different
4348

4449
Docker Scout is a platform designed to help organizations secure their software
4550
supply chain. It provides tools and services for identifying and managing
@@ -53,9 +58,11 @@ updated risk assessment is available within seconds, and earlier in the
5358
development process.
5459

5560
Docker Scout works by analyzing the composition of your images to create a
56-
[Software Bill of Materials (SBOM)](/manuals/scout/concepts/sbom.md). The SBOM is
57-
cross-referenced against the security advisories to identify CVEs that affect
58-
your images. Docker Scout integrates with [over 20 different security
61+
Software Bill of Materials (SBOM). The SBOM is cross-referenced against the
62+
security advisories to identify CVEs that affect your images. Docker Scout
63+
integrates with [over 20 different security
5964
advisories](/manuals/scout/deep-dive/advisory-db-sources.md), and updates its
6065
vulnerability database in real-time. This ensures that your security posture is
6166
represented using the latest available information.
67+
68+
<div id="scout-lp-survey-anchor"></div>

0 commit comments

Comments
 (0)