Skip to content

Commit cb671dd

Browse files
policy is optionally configured
Signed-off-by: Craig Osterhout <[email protected]>
1 parent 855b425 commit cb671dd

File tree

2 files changed

+26
-18
lines changed

2 files changed

+26
-18
lines changed

content/manuals/dhi/how-to/policies.md

Lines changed: 18 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,10 @@ images and layers.
4242

4343
## Evaluate DHI policy compliance for your images
4444

45-
When you enable Docker Scout for your repositories, Docker Scout automatically
46-
provides default policies, including the [**Valid Docker Hardened Image (DHI) or
47-
DHI base
45+
When you enable Docker Scout for your repositories, you can configure the
46+
[**Valid Docker Hardened Image (DHI) or DHI base
4847
image**](../../scout/policy/_index.md#valid-docker-hardened-image-dhi-or-dhi-base-image)
49-
policy. This policy validates whether your images are DHIs or built with DHI
48+
policy. This optional policy validates whether your images are DHIs or built with DHI
5049
base images by checking for Docker signed verification summary attestations.
5150

5251
The following example shows how to build an image using a DHI base image and
@@ -88,10 +87,22 @@ $ docker scout enroll YOUR_ORG
8887
$ docker scout repo enable --org YOUR_ORG YOUR_ORG/my-dhi-app
8988
```
9089

91-
#### Step 4: View policy compliance
90+
#### Step 4: Configure the DHI policy
9291

93-
Once Docker Scout is enabled, the default policies, including the **Valid Docker
94-
Hardened Image (DHI) or DHI base image** policy, are automatically active.
92+
Once Docker Scout is enabled, you can configure the **Valid Docker Hardened
93+
Image (DHI) or DHI base image** policy for your organization:
94+
95+
1. Go to the [Docker Scout dashboard](https://scout.docker.com).
96+
2. Select your organization and navigate to **Policies**.
97+
3. Configure the **Valid Docker Hardened Image (DHI) or DHI base image** policy
98+
to enable it for your repositories.
99+
100+
For more information on configuring policies, see
101+
[Configure policies](../../scout/policy/configure.md).
102+
103+
#### Step 5: View policy compliance
104+
105+
Once the DHI policy is configured and active, you can view compliance results:
95106

96107
1. Go to the [Docker Scout dashboard](https://scout.docker.com).
97108
2. Select your organization and navigate to **Images**.
@@ -102,12 +113,4 @@ Hardened Image (DHI) or DHI base image** policy evaluates whether your image has
102113
a valid Docker signed verification summary attestation or if its base image has
103114
such an attestation.
104115

105-
You can also view all active policies for your organization:
106-
107-
1. Go to the [Docker Scout dashboard](https://scout.docker.com).
108-
2. Select your organization and navigate to **Policies**.
109-
110-
Here you can see the **Valid Docker Hardened Image (DHI) or DHI base image**
111-
policy along with other default policies that Docker Scout provides.
112-
113116
You can now [evaluate policy compliance in your CI](/scout/policy/ci/).

content/manuals/scout/policy/_index.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -66,9 +66,14 @@ Docker Scout supports the following policy types:
6666
- [Valid Docker Hardened Image (DHI) or DHI base image](#valid-docker-hardened-image-dhi-or-dhi-base-image)
6767

6868
Docker Scout automatically provides default policies for repositories where it
69-
is enabled, except for the SonarQube Quality Gates policy, which requires
70-
[integration with SonarQube](/manuals/scout/integrations/code-quality/sonarqube.md)
71-
before use.
69+
is enabled, except for the following policies, which are optional and must be
70+
configured:
71+
72+
- The **SonarQube Quality Gates** policy, which requires
73+
[integration with SonarQube](/manuals/scout/integrations/code-quality/sonarqube.md)
74+
before use.
75+
- The **Valid Docker Hardened Image (DHI) or DHI base image** policy, which can
76+
be configured if you want to enforce the use of Docker Hardened Images.
7277

7378
You can create custom policies from any of the supported policy types, or
7479
delete a default policy if it isn't applicable to your project. For more

0 commit comments

Comments
 (0)