Skip to content

Commit 4105db3

Browse files
sbenhoff007dvdksn
authored andcommitted
scout: restructure learning path, add videos
1 parent 033acdf commit 4105db3

File tree

10 files changed

+92
-21
lines changed

10 files changed

+92
-21
lines changed

content/guides/docker-scout/_index.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,16 +15,14 @@ aliases:
1515
params:
1616
featured: true
1717
image: images/learning-paths/scout.png
18-
time: 10 minutes
18+
time: 20 minutes
1919
resource_links:
2020
- title: Docker Scout overview
2121
url: /scout/
2222
- title: Docker Scout quickstart
2323
url: /scout/quickstart/
2424
- title: Install Docker Scout
2525
url: /scout/install/
26-
- title: Software Bill of Materials
27-
url: /scout/concepts/sbom/
2826
---
2927

3028
When container images are insecure, significant risks can arise. Around 60% of
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Attestations
3+
keywords: build, attestations, sbom, provenance, metadata
4+
description: |
5+
Introduction to SBOM and provenance attestations with Docker Build,
6+
what they are, and why they exist
7+
weight: 50
8+
---
9+
10+
{{< youtube-embed qOzcycbTs4o >}}
11+
12+
[Build attestations](/manuals/build/metadata/attestations/_index.md) give you
13+
detailed information about how an image was built and what it contains. These
14+
attestations, generated by BuildKit during build-time, attach to the final
15+
image as metadata, allowing you to inspect an image to see its origin, creator,
16+
and contents. This information helps you make informed decisions about the
17+
security and impact of the image on your supply chain.
18+
19+
Docker Scout uses these attestations to evaluate the image's security and
20+
supply chain posture, and to provide remediation recommendations for issues. If
21+
issues are detected, such as missing or outdated attestations, Docker Scout can
22+
guide you on how to add or update them, ensuring compliance and improving
23+
visibility into the image's security status.
24+
25+
There are two key types of attestations:
26+
27+
- SBOM, which lists the software artifacts within the image.
28+
- Provenance, which details how the image was built.
29+
30+
You can create attestations by using `docker buildx build` with the
31+
`--provenance` and `--sbom` flags. Attestations attach to the image index,
32+
allowing you to inspect them without pulling the entire image. Docker Scout
33+
leverages this metadata to give you more precise recommendations and better
34+
control over your image's security.
35+
36+
<div id="scout-lp-survey-anchor"></div>

content/guides/docker-scout/common-questions.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
---
22
title: Common challenges and questions
33
description: Explore common challenges and questions related to Docker Scout.
4-
weight: 30
54
---
65

76
<!-- vale Docker.HeadingLength = NO -->

content/guides/docker-scout/demo.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,12 @@
11
---
22
title: Docker Scout demo
3+
linkTitle: Demo
34
description: Learn about Docker Scout's powerful features for enhanced supply chain security.
45
weight: 20
56
---
67

8+
{{< youtube-embed "TkLwJ0p46W8" >}}
9+
710
Docker Scout has powerful features for enhancing containerized application
811
security and ensuring a robust software supply chain.
912

@@ -15,6 +18,4 @@ security and ensuring a robust software supply chain.
1518
removing unnecessary packages
1619
- Verify and validate remediation efforts using Docker Scout
1720

18-
{{< youtube-embed "TkLwJ0p46W8" >}}
19-
2021
<div id="scout-lp-survey-anchor"></div>
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
title: Remediation
3+
description: Learn how Docker Scout can help you improve your software quality automatically, using remediation
4+
keywords: scout, supply chain, security, remediation, automation
5+
weight: 60
6+
---
7+
8+
{{< youtube-embed 7PsZbAsPgsY >}}
9+
10+
Docker Scout's [remediation feature](/manuals/scout/policy/remediation.md)
11+
helps you address supply chain and security issues by offering tailored
12+
recommendations based on policy evaluations. These recommendations guide you in
13+
improving policy compliance or enhancing image metadata, allowing Docker Scout
14+
to perform more accurate evaluations in the future.
15+
16+
You can use this feature to ensure that your base images are up-to-date and
17+
that your supply chain attestations are complete. When a violation occurs,
18+
Docker Scout provides recommended fixes, such as updating your base image or
19+
adding missing attestations. If there isn’t enough information to determine
20+
compliance, Docker Scout suggests actions to help resolve the issue.
21+
22+
In the Docker Scout Dashboard, you can view and act on these recommendations by
23+
reviewing violations or compliance uncertainties. With integrations like
24+
GitHub, you can even automate updates, directly fixing issues from the
25+
dashboard.
26+
27+
<div id="scout-lp-survey-anchor"></div>

content/manuals/scout/concepts/s3c.md renamed to content/guides/docker-scout/s3c.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,13 @@
22
title: Software supply chain security
33
description: Learn about software supply chain security (S3C), what it means, and why it is important.
44
keywords: docker scout, secure, software, supply, chain, security, sssc, sscs, s3c
5+
aliases:
6+
- /scout/concepts/s3c/
7+
weight: 30
58
---
69

10+
{{< youtube-embed YzNK6E7APv0 >}}
11+
712
The term "software supply chain" refers to the end-to-end process of developing
813
and delivering software, from the development to deployment and maintenance.
914
Software supply chain security, or "S3C" for short, is the practice for
@@ -39,7 +44,7 @@ day where software is built using multiple components from different sources.
3944
Organizations need to have a clear understanding of the software components
4045
they use, and the security risks associated with them.
4146

42-
## Docker Scout
47+
## How Docker Scout is different
4348

4449
Docker Scout is a platform designed to help organizations secure their software
4550
supply chain. It provides tools and services for identifying and managing
@@ -53,9 +58,11 @@ updated risk assessment is available within seconds, and earlier in the
5358
development process.
5459

5560
Docker Scout works by analyzing the composition of your images to create a
56-
[Software Bill of Materials (SBOM)](/manuals/scout/concepts/sbom.md). The SBOM is
57-
cross-referenced against the security advisories to identify CVEs that affect
58-
your images. Docker Scout integrates with [over 20 different security
61+
Software Bill of Materials (SBOM). The SBOM is cross-referenced against the
62+
security advisories to identify CVEs that affect your images. Docker Scout
63+
integrates with [over 20 different security
5964
advisories](/manuals/scout/deep-dive/advisory-db-sources.md), and updates its
6065
vulnerability database in real-time. This ensures that your security posture is
6166
represented using the latest available information.
67+
68+
<div id="scout-lp-survey-anchor"></div>

content/manuals/scout/concepts/sbom.md renamed to content/guides/docker-scout/sbom.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,13 @@
22
title: Software Bill of Materials
33
description: Learn about Software Bill of Materials (SBOM) and how Docker Scout uses it.
44
keywords: scout, sbom, software bill of materials, analysis, composition
5+
aliases:
6+
- /scout/concepts/sbom/
7+
weight: 40
58
---
69

10+
{{< youtube-embed FvAVgH-3YY4 >}}
11+
712
A Bill of Materials (BOM) is a list of materials, parts, and the quantities of
813
each needed to manufacture a product. For example, a BOM for a computer might
914
list the motherboard, CPU, RAM, power supply, storage devices, case, and other
@@ -35,16 +40,10 @@ An SBOM typically includes the following information:
3540

3641
Docker Scout uses SBOMs to determine the components that are used in a Docker
3742
image. When you analyze an image, Docker Scout will either use the SBOM that is
38-
attached to the image (using [attestations](/manuals/build/metadata/attestations/_index.md)), or
39-
it will generate an SBOM on the fly by analyzing the contents of the image.
43+
attached to the image as an attestation, or it will generate an SBOM on the fly
44+
by analyzing the contents of the image.
4045

4146
The SBOM is cross-referenced with the [advisory database](/manuals/scout/deep-dive/advisory-db-sources.md)
4247
to determine if any of the components in the image have known vulnerabilities.
4348

44-
## Additional resources
45-
46-
To learn more about generating SBOMs and how SBOMs are used in Docker Scout,
47-
see:
48-
49-
- [Image analysis in Docker Scout](/manuals/scout/explore/analysis.md)
50-
- [View and create SBOMs](/manuals/scout/how-tos/view-create-sboms.md)
49+
<div id="scout-lp-survey-anchor"></div>

content/guides/docker-scout/why.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@ description: Learn how Docker Scout can help you secure your supply chain.
44
weight: 10
55
---
66

7+
{{< youtube-embed "-omsQ7Uqyc4" >}}
8+
79
Organizations face significant challenges from data breaches,
810
including financial losses, operational disruptions, and long-term damage to
911
brand reputation and customer trust. Docker Scout addresses critical problems
@@ -22,6 +24,4 @@ development process. It also integrates with popular development tools like
2224
Docker Desktop and GitHub Actions, providing seamless security management and
2325
compliance checks within existing workflows.
2426

25-
{{< youtube-embed "-omsQ7Uqyc4" >}}
26-
2727
<div id="scout-lp-survey-anchor"></div>

content/manuals/build/metadata/attestations/_index.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@ aliases:
88
- /build/attestations/
99
---
1010

11+
{{< youtube-embed qOzcycbTs4o >}}
12+
1113
Build attestations describe how an image was built, and what it contains. The
1214
attestations are created at build-time by BuildKit, and become attached to the
1315
final image as metadata.

content/manuals/scout/policy/remediation.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@ keywords: scout, supply chain, security, remediation, automation
88
Remediation with Docker Scout is currently in [Beta](../../release-lifecycle.md#Beta).
99
{{% /experimental %}}
1010

11+
{{< youtube-embed 7PsZbAsPgsY >}}
12+
1113
Docker Scout helps you remediate supply chain or security issues by providing
1214
recommendations based on policy evaluation results. Recommendations are
1315
suggested actions you can take that improve policy compliance, or that add

0 commit comments

Comments
 (0)