Skip to content

Commit 3f50f67

Browse files
authored
Merge pull request #21108 from sbenhoff007/sssc-docker-concepts
guides: add videos to scout learning path
2 parents 51041c7 + 4688bea commit 3f50f67

File tree

12 files changed

+92
-30
lines changed

12 files changed

+92
-30
lines changed

content/guides/docker-scout/_index.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,16 +14,14 @@ aliases:
1414
params:
1515
featured: true
1616
image: images/learning-paths/scout.png
17-
time: 10 minutes
17+
time: 20 minutes
1818
resource_links:
1919
- title: Docker Scout overview
2020
url: /scout/
2121
- title: Docker Scout quickstart
2222
url: /scout/quickstart/
2323
- title: Install Docker Scout
2424
url: /scout/install/
25-
- title: Software Bill of Materials
26-
url: /scout/concepts/sbom/
2725
---
2826

2927
When container images are insecure, significant risks can arise. Around 60% of
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Attestations
3+
keywords: build, attestations, sbom, provenance, metadata
4+
description: |
5+
Introduction to SBOM and provenance attestations with Docker Build,
6+
what they are, and why they exist
7+
weight: 50
8+
---
9+
10+
{{< youtube-embed qOzcycbTs4o >}}
11+
12+
[Build attestations](/manuals/build/metadata/attestations/_index.md) give you
13+
detailed information about how an image was built and what it contains. These
14+
attestations, generated by BuildKit during build-time, attach to the final
15+
image as metadata, allowing you to inspect an image to see its origin, creator,
16+
and contents. This information helps you make informed decisions about the
17+
security and impact of the image on your supply chain.
18+
19+
Docker Scout uses these attestations to evaluate the image's security and
20+
supply chain posture, and to provide remediation recommendations for issues. If
21+
issues are detected, such as missing or outdated attestations, Docker Scout can
22+
guide you on how to add or update them, ensuring compliance and improving
23+
visibility into the image's security status.
24+
25+
There are two key types of attestations:
26+
27+
- SBOM, which lists the software artifacts within the image.
28+
- Provenance, which details how the image was built.
29+
30+
You can create attestations by using `docker buildx build` with the
31+
`--provenance` and `--sbom` flags. Attestations attach to the image index,
32+
allowing you to inspect them without pulling the entire image. Docker Scout
33+
leverages this metadata to give you more precise recommendations and better
34+
control over your image's security.
35+
36+
<div id="scout-lp-survey-anchor"></div>

content/guides/docker-scout/common-questions.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
---
22
title: Common challenges and questions
33
description: Explore common challenges and questions related to Docker Scout.
4-
weight: 30
54
---
65

76
<!-- vale Docker.HeadingLength = NO -->

content/guides/docker-scout/demo.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,12 @@
11
---
22
title: Docker Scout demo
3+
linkTitle: Demo
34
description: Learn about Docker Scout's powerful features for enhanced supply chain security.
45
weight: 20
56
---
67

8+
{{< youtube-embed "TkLwJ0p46W8" >}}
9+
710
Docker Scout has powerful features for enhancing containerized application
811
security and ensuring a robust software supply chain.
912

@@ -15,6 +18,4 @@ security and ensuring a robust software supply chain.
1518
removing unnecessary packages
1619
- Verify and validate remediation efforts using Docker Scout
1720

18-
{{< youtube-embed "TkLwJ0p46W8" >}}
19-
2021
<div id="scout-lp-survey-anchor"></div>
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
title: Remediation
3+
description: Learn how Docker Scout can help you improve your software quality automatically, using remediation
4+
keywords: scout, supply chain, security, remediation, automation
5+
weight: 60
6+
---
7+
8+
{{< youtube-embed jM9zLBf8M-8 >}}
9+
10+
Docker Scout's [remediation feature](/manuals/scout/policy/remediation.md)
11+
helps you address supply chain and security issues by offering tailored
12+
recommendations based on policy evaluations. These recommendations guide you in
13+
improving policy compliance or enhancing image metadata, allowing Docker Scout
14+
to perform more accurate evaluations in the future.
15+
16+
You can use this feature to ensure that your base images are up-to-date and
17+
that your supply chain attestations are complete. When a violation occurs,
18+
Docker Scout provides recommended fixes, such as updating your base image or
19+
adding missing attestations. If there isn’t enough information to determine
20+
compliance, Docker Scout suggests actions to help resolve the issue.
21+
22+
In the Docker Scout Dashboard, you can view and act on these recommendations by
23+
reviewing violations or compliance uncertainties. With integrations like
24+
GitHub, you can even automate updates, directly fixing issues from the
25+
dashboard.
26+
27+
<div id="scout-lp-survey-anchor"></div>

content/manuals/scout/concepts/s3c.md renamed to content/guides/docker-scout/s3c.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,13 @@
22
title: Software supply chain security
33
description: Learn about software supply chain security (S3C), what it means, and why it is important.
44
keywords: docker scout, secure, software, supply, chain, security, sssc, sscs, s3c
5+
aliases:
6+
- /scout/concepts/s3c/
7+
weight: 30
58
---
69

10+
{{< youtube-embed YzNK6E7APv0 >}}
11+
712
The term "software supply chain" refers to the end-to-end process of developing
813
and delivering software, from the development to deployment and maintenance.
914
Software supply chain security, or "S3C" for short, is the practice for
@@ -39,7 +44,7 @@ day where software is built using multiple components from different sources.
3944
Organizations need to have a clear understanding of the software components
4045
they use, and the security risks associated with them.
4146

42-
## Docker Scout
47+
## How Docker Scout is different
4348

4449
Docker Scout is a platform designed to help organizations secure their software
4550
supply chain. It provides tools and services for identifying and managing
@@ -53,9 +58,11 @@ updated risk assessment is available within seconds, and earlier in the
5358
development process.
5459

5560
Docker Scout works by analyzing the composition of your images to create a
56-
[Software Bill of Materials (SBOM)](/manuals/scout/concepts/sbom.md). The SBOM is
57-
cross-referenced against the security advisories to identify CVEs that affect
58-
your images. Docker Scout integrates with [over 20 different security
61+
Software Bill of Materials (SBOM). The SBOM is cross-referenced against the
62+
security advisories to identify CVEs that affect your images. Docker Scout
63+
integrates with [over 20 different security
5964
advisories](/manuals/scout/deep-dive/advisory-db-sources.md), and updates its
6065
vulnerability database in real-time. This ensures that your security posture is
6166
represented using the latest available information.
67+
68+
<div id="scout-lp-survey-anchor"></div>

content/manuals/scout/concepts/sbom.md renamed to content/guides/docker-scout/sbom.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,13 @@
22
title: Software Bill of Materials
33
description: Learn about Software Bill of Materials (SBOM) and how Docker Scout uses it.
44
keywords: scout, sbom, software bill of materials, analysis, composition
5+
aliases:
6+
- /scout/concepts/sbom/
7+
weight: 40
58
---
69

10+
{{< youtube-embed PbS4y7C7h4A >}}
11+
712
A Bill of Materials (BOM) is a list of materials, parts, and the quantities of
813
each needed to manufacture a product. For example, a BOM for a computer might
914
list the motherboard, CPU, RAM, power supply, storage devices, case, and other
@@ -35,16 +40,10 @@ An SBOM typically includes the following information:
3540

3641
Docker Scout uses SBOMs to determine the components that are used in a Docker
3742
image. When you analyze an image, Docker Scout will either use the SBOM that is
38-
attached to the image (using [attestations](/manuals/build/metadata/attestations/_index.md)), or
39-
it will generate an SBOM on the fly by analyzing the contents of the image.
43+
attached to the image as an attestation, or it will generate an SBOM on the fly
44+
by analyzing the contents of the image.
4045

4146
The SBOM is cross-referenced with the [advisory database](/manuals/scout/deep-dive/advisory-db-sources.md)
4247
to determine if any of the components in the image have known vulnerabilities.
4348

44-
## Additional resources
45-
46-
To learn more about generating SBOMs and how SBOMs are used in Docker Scout,
47-
see:
48-
49-
- [Image analysis in Docker Scout](/manuals/scout/explore/analysis.md)
50-
- [View and create SBOMs](/manuals/scout/how-tos/view-create-sboms.md)
49+
<div id="scout-lp-survey-anchor"></div>

content/guides/docker-scout/why.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@ description: Learn how Docker Scout can help you secure your supply chain.
44
weight: 10
55
---
66

7+
{{< youtube-embed "-omsQ7Uqyc4" >}}
8+
79
Organizations face significant challenges from data breaches,
810
including financial losses, operational disruptions, and long-term damage to
911
brand reputation and customer trust. Docker Scout addresses critical problems
@@ -22,6 +24,4 @@ development process. It also integrates with popular development tools like
2224
Docker Desktop and GitHub Actions, providing seamless security management and
2325
compliance checks within existing workflows.
2426

25-
{{< youtube-embed "-omsQ7Uqyc4" >}}
26-
2727
<div id="scout-lp-survey-anchor"></div>

content/manuals/build/metadata/attestations/_index.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@ aliases:
88
- /build/attestations/
99
---
1010

11+
{{< youtube-embed qOzcycbTs4o >}}
12+
1113
Build attestations describe how an image was built, and what it contains. The
1214
attestations are created at build-time by BuildKit, and become attached to the
1315
final image as metadata.

content/manuals/scout/concepts/_index.md

Lines changed: 0 additions & 6 deletions
This file was deleted.

0 commit comments

Comments
 (0)