Skip to content

Commit aba4ea8

Browse files
authored
Merge pull request #21080 from dvdksn/scoutguide-rm-footnotes
guides: scout learning path fixups
2 parents c3b77c9 + 597621f commit aba4ea8

File tree

2 files changed

+9
-10
lines changed

2 files changed

+9
-10
lines changed

Dockerfile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
1-
# syntax=docker/dockerfile-upstream:master
1+
# syntax=docker/dockerfile:1
22
# check=skip=InvalidBaseImagePlatform
33

44
# ALPINE_VERSION sets the Alpine Linux version for all Alpine stages
55
ARG ALPINE_VERSION=3.20
66
# GO_VERSION sets the Go version for the base stage
77
ARG GO_VERSION=1.23
8-
# HTML_TEST_VERSION sets the wjdp/htmltest version for HTML testing
8+
# HTMLTEST_VERSION sets the wjdp/htmltest version for HTML testing
99
ARG HTMLTEST_VERSION=0.17.0
1010

1111
# base is the base stage with build dependencies

content/guides/docker-scout/_index.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -29,24 +29,23 @@ params:
2929

3030
When container images are insecure, significant risks can arise. Around 60% of
3131
organizations have reported experiencing at least one security breach or
32-
vulnerability incident within a year, resulting in operational
33-
disruption.[^CSA] These incidents often result in considerable downtime, with
32+
vulnerability incident within a year, [resulting in operational
33+
disruption][CSA]. These incidents often result in considerable downtime, with
3434
44% of affected companies experiencing over an hour of downtime per event. The
35-
financial impact is substantial, with the average data breach cost reaching
36-
$4.45 million.[^IBM] This highlights the critical importance of maintaining
35+
financial impact is substantial, with [the average data breach cost reaching
36+
$4.45 million][IBM]. This highlights the critical importance of maintaining
3737
robust container security measures.
3838

3939
Docker Scout enhances container security by providing automated vulnerability
4040
detection and remediation, addressing insecure container images, and ensuring
4141
compliance with security standards.
4242

43-
[^CSA]: https://cloudsecurityalliance.org/blog/2023/09/21/2023-global-cloud-threat-report-cloud-attacks-are-lightning-fast
44-
45-
[^IBM]: https://www.ibm.com/reports/data-breach
43+
[CSA]: https://cloudsecurityalliance.org/blog/2023/09/21/2023-global-cloud-threat-report-cloud-attacks-are-lightning-fast
44+
[IBM]: https://www.ibm.com/reports/data-breach
4645

4746
## What you'll learn
4847

49-
- Define secure software supply chain (SSSC)
48+
- Define Secure Software Supply Chain (SSSC)
5049
- Review SBOMs and how to use them
5150
- Detect and monitor vulnerabilities
5251

0 commit comments

Comments
 (0)