Merge pull request #18283 from dvdksn/scout-ga-launch

scout: ga launch
This commit is contained in:
David Karlsson 2023-10-04 17:55:36 +02:00 committed by GitHub
commit 58de252407
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
60 changed files with 371 additions and 245 deletions

View File

@ -4,8 +4,6 @@ description: Learn how to buy Docker Scout and manage your subscription
keywords: payments, billing, subscription, scout
---
{{< include "scout-early-access.md" >}}
Docker Scout lets users secure their software supply chain and continuously observe and improve their security posture. Docker Scout is free for up to 3 repositories. You can buy Docker Scout Team or Docker Scout Business to turn on Docker Scout for additional repositories. See [Docker Scout subscription and features](../subscription/scout-details.md) to select the plan that works for you.
In this section, learn how to buy Docker Scout Team in Docker Hub for your personal account or for an organization. To buy Docker Scout Business, [contact sales](https://www.docker.com/products/docker-scout/).

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -12,5 +12,3 @@ repository on GitHub:
https://github.com/docker/scout-cli
-->
{{< include "scout-early-access.md" >}}

View File

@ -1,8 +0,0 @@
> **Early Access**
>
> Docker Scout secures the complete software supply chain by providing image
> analysis, real-time vulnerability identification, contextual remediation
> recommendations, and more. Now available in [early access](/release-lifecycle/#early-access-ea).
>
> Learn more on the [Docker Scout product page](https://docker.com/products/docker-scout).
{ .restricted }

View File

@ -1,3 +0,0 @@
> **Info**
>
> The Docker Scout free plan gives you unlimited local image analysis and up to 3 remote repositories. [If you need more, upgrade your plan](/billing/scout-billing/).

View File

@ -35,15 +35,18 @@ grid:
description: |
The web interface for Docker Scout.
icon: dashboard
- title: Policy {{< badge color=violet text=Beta >}}
- title: Policy {{< badge color=violet text="Early Access" >}}
link: /scout/policy/
description: |
Ensure that your artifacts align with supply chain best practices.
icon: policy
- title: Upgrade
link: /billing/scout-billing/
description: |
The free plan includes up to 3 repositories. Upgrade for more.
icon: upgrade
---
{{< include "scout-early-access.md" >}}
Container images are often built from layers of other container images and
software packages. These layers and packages can contain vulnerabilities that
make your containers and the applications they run vulnerable to attack.
@ -59,6 +62,4 @@ the [Docker Scout Dashboard](./dashboard.md). Docker Scout also supports
integrations with third-party systems, refer to [Integrating Docker
Scout](./integrations/index.md) for more information.
{{< include "scout-plans.md" >}}
{{< grid >}}

View File

@ -5,8 +5,6 @@ keywords: scanning, analysis, vulnerabilities, Hub, supply chain, security
title: Advisory database sources and matching service
---
{{< include "scout-early-access.md" >}}
Docker Scout is a service that helps developers and security teams build and
maintain a secure software supply chain. A key component of this is the ability
to assess your software artifacts against a reliable source of vulnerability

View File

@ -8,56 +8,64 @@ aliases:
- /scout/web-app/
---
{{< include "scout-early-access.md" >}}
The Docker Scout Dashboard helps you share the analysis of images in an organization with your team. Developers can now see an overview of their security status across all their images from both Docker Hub and Artifactory, and get remediation advice at their fingertips. It helps team members in roles such as security, compliance, and operations to know what vulnerabilities and issues they need to focus on.
## Overview
![A screenshot of the Docker Scout vulnerabilities overview](./images/dashboard-overview.png)
![A screenshot of the Docker Scout Dashboard overview](./images/dashboard-overview.webp?border=true)
The **Overview** tab shows the total number of vulnerabilities across all your Docker Scout-enabled repositories, over time. This calculation takes the most recent image in each repository to avoid including old irrelevant images.
The **Overview** tab provides a summary for the repositories in the selected
organization.
## Repository settings
At the top of this page, you can select which **Environment** to view.
By default, the most recently pushed images are shown. To learn more about
environments, see [Environment monitoring](./integrations/environment/_index.md).
Enable Docker Scout analysis on repositories from Docker Hub in the current organization
by selecting the settings icon next to your user profile picture and then the **Repository settings** menu item.
The **Policy** boxes show your current compliance rating for each policy, and a
trend indication for the selected environment. The trend describes the policy
delta for the most recent images compared to the previous version.
For more information about policies, see [Policy Evaluation](./policy/_index.md).
Select the checkboxes for the repositories on which you want to enable Docker Scout analysis and
select **Enable image analysis**.
The vulnerability chart shows the total number of vulnerabilities for images in
the selected environment over time. You can configure the timescale for the
chart using the drop-down menu.
When you enable image analysis for a repository, Docker Scout analyzes new tags
automatically when you push to that repository. Find out more in the [image analysis](./image-analysis.md) documentation.
Use the header menu at the top of the website to access the different main
sections of the Docker Scout Dashboard:
Disable Docker Scout analysis on selected repositories by selecting **Disable image analysis**.
- [Images](#images)
- [Policies](#policies)
- [Vulnerabilities](#vulnerabilities)
- [Base images](#base-images)
- [Packages](#packages)
## Images
The **Images** tab shows a list of images in an organization. You can search for specific repositories using the search box.
The **Images** view shows a list of images in an organization. You can search
for specific repositories using the search box.
Each entry in the list shows the following details:
- The repository name for the image. Selecting the link for the repository opens [the list of tags for the repository](#repository-tag-list).
- The most recent tag of the image and the vulnerabilities for that version. Selecting the link for the base image opens [the image layer view](#image-layer-view).
- The most recent tag of the image in the selected environment. Selecting the link for the base image opens [the image details view](#image-details-view).
- The operating system and architecture of the image.
- The date of the last push for the image.
- The base image and version used by the repository and the vulnerabilities for that version. Clicking the link for the base image opens [the image layer view](#image-layer-view).
> **Note**
>
> Docker Scout detects the base image of an image by matching layer content hashes.
> However, it's possible for multiple images and tags to be associated with these layers. In these cases, Docker Scout's
> base image detection might not be precise and potentially return a different tag to the one used in the Dockerfile.
- The recommended fixes, which can include options such as changing tags or rebuilding an image.
- The predicted improvement to the vulnerabilities if you apply the recommended fixes.
- An action button to show implementable recommended fixes.
- The vulnerabilities for the most recent image version.
- Policy status, including the change for the most recent version, and a link to more details for non-compliant images.
### Repository tag list
![Screenshot of tags for a repository](./images/dashboard-repo-tags.png)
![Screenshot of tags for a repository](./images/dashboard-repo-tags.webp?border=true)
The repository tag list shows all tags for a repository. You can search for specific tag versions using the search box.
There are two tabs on this page:
- The **Policy** tab displays the policy delta for the latest version of the
image.
- The **Tags** tab contains the repository tag list, and shows all tags for the
repository.
In the **Tags** tab, you can filter the list by environment, or by tag or
digest using the search box.
Each entry in the list shows the following details:
@ -68,28 +76,48 @@ Each entry in the list shows the following details:
> Compare two image tags by selecting the checkboxes next to them and selecting the **Compare images** button at the top of the list.
{ .tip }
- The tag version. Clicking the link for version opens [the image layer view](#image-layer-view).
- The tag version or image digest. Clicking the link for version opens [the image layer view](#image-details-view).
- The [environments](./integrations/environment/_index.md) that the image is assigned to.
- The operating system and architecture of the image.
- The vulnerabilities for the tag version.
- The last push for the tag version.
- The base image and version used by the repository and the vulnerabilities for
that version.
- The size of the image tag.
- The base image and version used by the repository and the vulnerabilities for that version.
#### Comparing two tag images
#### Compare images
The top section of the comparison view shows an overview of the two selected image tags.
You can compare two or more images in the list. Mark the image versions that
you want to compare, and select **Compare images**.
The tabs section of the view shows the following:
The top section of the comparison view shows an overview of the two selected
image tags. The tabs section of the view shows the following:
- Select the **Packages** tab to see packages added, removed, or changed in each image. Each entry in the table shows the differences between the versions and vulnerabilities in each image. Select the disclosure triangle next to a package to see more detail on the vulnerabilities changed.
- Select the **Vulnerabilities** tab to see changes to the vulnerabilities present in each image.
### Image layer view
### Image details view
![Screenshot showing Docker Scout image hierarchy](./images/dashboard-hierachy.png)
Selecting an image tag takes you to the image details view. This view contains
two tabs that let you drill down into the details of the composition and
policy compliance for the image: **Policy status** and **Image layers**.
The image layer view shows a breakdown of the Docker Scout analysis, including
{{< tabs >}}
{{< tab name="Policy status" >}}
![Screenshot of the policy tab in the image details view](./images/dashboard-image-policies.webp?border=true)
The policy tab shows you the policy evaluation results for the image. Use the
**View details** and **View fixes** links to the right to view the full
evaluation results, and learn how to improve compliance score for non-compliant
images.
For more information about policy, see [Policy Evaluation](./policy/_index.md).
{{< /tab >}}
{{< tab name="Image layers" >}}
![Screenshot showing Docker Scout image layers](./images/dashboard-image-layers.webp?border=true)
The layer view shows a breakdown of the Docker Scout analysis, including
an overview of the digest Secure Hash Algorithms (SHA), version, the image hierarchy (base images), image
layers, packages, and vulnerabilities.
@ -97,22 +125,24 @@ layers, packages, and vulnerabilities.
>
> You can find more details on the elements in the image layer view in [the image details view docs](./image-details-view.md).
Select the **View recommended fixes** button to see instructions to apply the recommended fixes for the image.
{{< /tab >}}
{{< /tabs >}}
## Packages
## Policies
The **Packages** tab shows all packages across repositories in an organization.
![A screenshot of the Docker Scout policies view](./images/dashboard-policies-view.webp?border=true)
Each entry in the list shows the following details:
The **Policies** view shows a breakdown of policy compliance for all of the
images in the selected organization and environment. You can use the **Image**
drop-down menu to view a policy breakdown for a specific environment.
- The package name.
- The package type.
- The versions of the package used by images in the organization.
- The number of images that use the package.
For more information about policies, see [Policy Evaluation](./policy/_index.md).
## Base images
The **Base images** tab shows all base images used by repositories in an organization.
![A screenshot of the Docker Scout view showing base images used](./images/dashboard-base-images.webp?border=true)
The **Base images** view shows all base images used by repositories in an organization.
Each entry in the list shows the following details:
@ -123,22 +153,33 @@ Each entry in the list shows the following details:
### Images using base image
![A screenshot of the Docker Scout view showing images that use a selected base image](./images/dashboard-images-used-by.png)
The **Images** tab shows all images in an organization that use a specific base image.
Each entry in the list shows the following details:
- The repository name. Selecting the link opens [the list of tags for the repository](#repository-tag-list).
- The most recent tag of the image and its vulnerabilities. Selecting the link for the tag opens [the Image layer detail view](#image-layer-view) for the repository.
- The most recent tag of the image and its vulnerabilities. Selecting the link for the tag opens [the Image layer detail view](#image-details-view) for the repository.
- The operating system and architecture of the image.
- The base image tag used by the repository. Selecting the link opens [the image layer detail view](#image-layer-view) for that version.
- The base image tag used by the repository. Selecting the link opens [the image layer detail view](#image-details-view) for that version.
- The current base image digest for the repository.
- The date of the last push for the repository.
## Packages
The **Packages** view shows all packages across repositories in an organization.
Each entry in the list shows the following details:
- The package name.
- The package type.
- The versions of the package used by images in the organization.
- The number of images that use the package.
## Vulnerabilities
The **Vulnerabilities** tab shows a list of all vulnerabilities from images in the organization. You can sort and filter the list by severity and search for Common Vulnerabilities and Exposures (CVE) ID using the search box.
The **Vulnerabilities** view shows a list of all vulnerabilities from images in
the organization. You can sort and filter the list by severity and search for
Common Vulnerabilities and Exposures (CVE) ID using the search box.
Each entry in the list shows the following details:
@ -158,17 +199,51 @@ Each entry in the list shows the following details:
### Vulnerability details page
The vulnerability details page shows detailed information about a particular CVE. The page shows the following information:
The vulnerability details page shows detailed information about a particular
CVE. This page is a publicly open page. You can share the link to a particular
CVE description with other people even if they're not a member of your Docker
organization.
The page shows the following information:
- The CVE ID and severity.
- A description of the vulnerability.
- The number of packages affected by the vulnerability.
- The vulnerability publish date.
Following this information is a list of all repositories affected by the vulnerability, searchable by image name. Each entry in the list shows the following details:
Following this information is a list of all repositories affected by the
vulnerability, searchable by image name. Each entry in the list shows the
following details:
- The repository name. Selecting the link for the repository name opens [the repository tag list view](#repository-tag-list).
- The current tag version of the image. Selecting the link for the tag name opens [the repository tag list layer view](#image-layer-view).
- The current tag version of the image. Selecting the link for the tag name opens [the repository tag list layer view](#image-details-view).
- The date the image was last pushed.
- The registry where the image is stored.
- The affected package name and version in the image.
## Settings
The settings menu under the drop-down in the website header contains link to go
to the [Integrations](#integrations) page and [Repository
settings](#repository-settings).
### Integrations
The **Integrations** page lets you create and manage your Docker Scout
integrations, such as environment integrations and registry integrations. For
more information on how to get started with integrations, see [Integrating
Docker Scout with other systems](./integrations/_index.md).
### Repository settings
The **Repository settings** is where you enable and disable Docker Scout for
repositories in your organization.
To enable repositories, select the checkboxes for the repositories on which you
want to enable Docker Scout analysis and select **Enable image analysis**.
When you enable image analysis for a repository, Docker Scout analyzes new tags
automatically when you push to that repository.
Disable Docker Scout analysis on selected repositories by selecting **Disable
image analysis**.

View File

@ -4,8 +4,6 @@ keywords: scanning, supply chain, security, data, metadata
title: Data collection and storage in Docker Scout
---
{{< include "scout-early-access.md" >}}
Docker Scout image analysis works by collecting metadata from the container
images that you analyze. This metadata is stored on the Docker Scout platform.

View File

@ -8,8 +8,6 @@ aliases:
- /scout/advanced-image-analysis/
---
{{< include "scout-early-access.md" >}}
When you activate image analysis for a repository, Docker Scout analyzes new
images automatically when you push to that repository. Docker Scout image
analysis is more than point-in-time scanning, the analysis gets reevaluated

View File

@ -6,8 +6,6 @@ description: The Docker Scout image detail view analyzes images to show their he
layers, packages, and vulnerabilities
---
{{< include "scout-early-access.md" >}}
The image details view shows a breakdown of the Docker Scout analysis. You can
access the image view from within Docker Desktop and from the image tag
page on Docker Hub. The view provides a breakdown of the image hierarchy (base
@ -155,4 +153,4 @@ one to use.
Select a tag recommendation to see further details of the recommendation.
It shows the benefits and potential disadvantages of the tag, why it's a
recommended, and how to update your Dockerfile to use this version.
recommended, and how to update your Dockerfile to use this version.

Binary file not shown.

After

Width:  |  Height:  |  Size: 123 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 205 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 104 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 65 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 187 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 215 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 82 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 53 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 138 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 35 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 217 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 41 KiB

View File

@ -4,8 +4,6 @@ keywords: supply chain, security, integrations, registries, ci, environments
title: Integrating Docker Scout with other systems
---
{{< include "scout-early-access.md" >}}
By default, Docker Scout integrates with your Docker organization and your
Docker Scout-enabled repositories on Docker Hub. You can integrate Docker Scout
with additional third-party systems to get access to even more insights,

View File

@ -7,8 +7,6 @@ aliases:
- /scout/ci/
---
{{< include "scout-early-access.md" >}}
You can analyze Docker images in continuous integration pipelines as you build
them using a GitHub action or the Docker Scout CLI plugin.

View File

@ -4,10 +4,8 @@ keywords: supply chain, security, ci, continuous integration, azure, devops
title: Integrate Docker Scout with Microsoft Azure DevOps Pipelines
---
{{< include "scout-early-access.md" >}}
The following examples runs in an Azure DevOps-connected repository containing a
Docker image's definition and contents. Triggered by a commit to the main
The following examples runs in an Azure DevOps-connected repository containing
a Docker image's definition and contents. Triggered by a commit to the main
branch, the pipeline builds the image and uses Docker Scout to create a CVE
report.
@ -64,4 +62,4 @@ stages:
This creates the flow mentioned previously. It builds and tags the image using
the checked-out Dockerfile, downloads the Docker Scout CLI, and then runs the
`cves` command against the new tag to generate a CVE report. It only shows
critical or high-severity vulnerabilities.
critical or high-severity vulnerabilities.

View File

@ -4,8 +4,6 @@ keywords: supply chain, security, ci, continuous integration, circle ci
title: Integrate Docker Scout with Circle CI
---
{{< include "scout-early-access.md" >}}
The following examples runs when triggered in CircleCI. When triggered, it
checks out the "docker/scout-demo-service:latest" image and tag and then uses
Docker Scout to create a CVE report.
@ -73,4 +71,4 @@ workflows:
build-docker-image:
jobs:
- build
```
```

View File

@ -4,8 +4,6 @@ keywords: supply chain, security, ci, continuous integration, github actions
title: Integrate Docker Scout with GitHub Actions
---
{{< include "scout-early-access.md" >}}
You can use [the Docker Scout GitHub action](https://github.com/docker/scout-action) to run Docker Scout CLI commands
as part of a workflow.

View File

@ -4,8 +4,6 @@ keywords: supply chain, security, ci, continuous integration, gitlab
title: Integrate Docker Scout with GitLab CI
---
{{< include "scout-early-access.md" >}}
The following examples runs in GitLab CI in a repository containing a Docker
image's definition and contents. Triggered by a commit, the pipeline builds the
image. If the commit was to the default branch, it uses Docker Scout to get a
@ -90,4 +88,4 @@ Dockerfile and if the commit was to the CI branch.
_The following is a video walkthrough of the process of setting up the workflow with GitLab._
<div style="position: relative; padding-bottom: 64.86486486486486%; height: 0;"><iframe src="https://www.loom.com/embed/451336c4508c42189532108fc37b2560?sid=f912524b-276d-417d-b44a-c2d39719aa1a" frameborder="0" webkitallowfullscreen mozallowfullscreen allowfullscreen style="position: absolute; top: 0; left: 0; width: 100%; height: 100%;"></iframe></div>
<div style="position: relative; padding-bottom: 64.86486486486486%; height: 0;"><iframe src="https://www.loom.com/embed/451336c4508c42189532108fc37b2560?sid=f912524b-276d-417d-b44a-c2d39719aa1a" frameborder="0" webkitallowfullscreen mozallowfullscreen allowfullscreen style="position: absolute; top: 0; left: 0; width: 100%; height: 100%;"></iframe></div>

View File

@ -4,8 +4,6 @@ keywords: supply chain, security, ci, continuous integration, jenkins
title: Integrate Docker Scout with Jenkins
---
{{< include "scout-early-access.md" >}}
You can add the following stage and steps definition to a `Jenkinsfile` to run
Docker Scout as part of a Jenkins pipeline. The pipeline needs two secrets
defined to authenticate with Docker Hub: `DOCKER_HUB_USER` and `DOCKER_HUB_PAT`

View File

@ -6,8 +6,6 @@ keywords: supply chain, security, streams, environments, workloads, deployments
title: Integrating Docker Scout with environments
---
{{< include "scout-early-access.md" >}}
You can integrate Docker Scout with your runtime environments, and get insights
for your running workloads. This gives you a real-time view of your security
status for your deployed artifacts.

View File

@ -6,8 +6,6 @@ aliases:
- /scout/artifactory/
---
{{< include "scout-early-access.md" >}}
Integrating Docker Scout with JFrog Artifactory lets you run image analysis
automatically on images in Artifactory registries.

View File

@ -4,8 +4,6 @@ keywords: docker scout, ecr, integration, image analysis, security, cves
title: Integrate Docker Scout with Amazon ECR
---
{{< include "scout-early-access.md" >}}
Integrating Docker Scout with Amazon Elastic Container Registry (ECR) lets you
view image insights for images hosted in ECR repositories. After integrating
Docker Scout with ECR and activating Docker Scout for a repository, pushing an

View File

@ -4,8 +4,6 @@ description: Analyze and compare local code using Docker Scout on the command li
keywords: scout, vulnerabilities, analyze, analysis, cli, packages, sbom, cve, security, local, source, code, supply chain
---
{{< include "scout-early-access.md" >}}
You can use the `fs://` protocol prefix with Docker Scout CLI commands to
analyze your local source code directly, without having to build and push
container images. The following commands support the `fs://` prefix:

View File

@ -7,14 +7,10 @@ description: |
requirements over time
---
> **Beta**
> **Early Access**
>
> Policy Evaluation is a [Beta](/release-lifecycle/#beta) feature of Docker
> Scout. This feature is available to organizations participating in the
> limited preview program for policies.
>
> If you're interested in trying out this feature, reach out using the form on
> the [Docker Scout product page](https://docker.com/products/docker-scout)
> Policy Evaluation is an [Early Access](/release-lifecycle/#early-access-ea)
> feature of Docker Scout.
{ .restricted }
In software supply chain management, maintaining the security and reliability

View File

@ -6,14 +6,10 @@ description: |
keywords: scout, policy, status, vulnerabilities, supply chain, cves, licenses
---
> **Beta**
> **Early Access**
>
> Policy Evaluation is a [Beta](/release-lifecycle/#beta) feature of Docker
> Scout. This feature is available to organizations participating in the
> limited preview program for policies.
>
> If you're interested in trying out this feature, reach out using the form on
> the [Docker Scout product page](https://docker.com/products/docker-scout)
> Policy Evaluation is an [Early Access](/release-lifecycle/#early-access-ea)
> feature of Docker Scout.
{ .restricted }
You can track policy status for your artifacts from the [Docker Scout

View File

@ -6,8 +6,6 @@ aliases:
- /atomist/get-started/
---
{{< include "scout-early-access.md" >}}
Docker Scout analyzes image contents and generates a detailed report of packages
and vulnerabilities that it detects. It can provide you with
suggestions for how to remediate issues discovered by image analysis.

View File

@ -0,0 +1,95 @@
---
title: Docker Scout release notes
description: Learn about the latest features of Docker Scout
keywords: docker scout, release notes, changelog, features, changes, delta, new, releases
---
This page contains information about the new features, improvements, known
issues, and bug fixes in Docker Scout releases. These release notes cover the
Docker Scout platform, including the Dashboard. For CLI release notes, refer to
the `docker/scout-cli` [GitHub repository](https://github.com/docker/scout-cli/releases).
Take a look at the [Docker Public Roadmap](https://github.com/docker/roadmap/projects/1)
for what's coming next.
## 2023-10-04
This marks the General Availability (GA) release of Docker Scout.
### New
The following new features are included in this release:
- [Policy Evaluation](#policy-evaluation) (Early Access)
- [Amazon ECR integration](#amazon-ecr-integration)
- [Sysdig integration](#sysdig-integration)
- [JFrog Artifactory integration](#jfrog-artifactory-integration)
#### Policy evaluation
Policy Evaluation is an early access feature that helps you ensure software
integrity and track how your artifacts are doing over time. This release ships
with four out-of-the-box policies, enabled by default for all organizations.
![Policy overview in Dashboard](./images/release-notes/policy-ea.webp)
- **Base images not up-to-date** evaluates whether the base images are out of
date, and require updating. Up-to-date base images help you ensure that your
environments are reliable and secure.
- **Critical and high vulnerabilities with fixes** reports if there are
vulnerabilities with critical or high severity in your images, and where
there's a fix version available that you can upgrade to.
- **All critical vulnerabilities** looks out for any vulnerabilities of
critical severity found in your images.
- **Packages with AGPLv3, GPLv3 license** helps you catch possibly unwanted
copyleft licenses used in your images.
You can view and evaluate policy status for images using the Docker Scout
Dashboard and the `docker scout policy` CLI command. For more information,
refer to the [Policy Evaluation documentation](./policy/_index.md).
#### Amazon ECR integration
The new Amazon Elastic Container Registry (ECR) integration enables image
analysis for images hosted in ECR repositories.
You set up the integration using a pre-configured CloudFormation stack template
that bootstraps the necessary AWS resources in your account. Docker Scout
automatically analyzes images that you push to your registry, storing only the
metadata about the image contents, and not the container images themselves.
The integration offers a straightforward process for adding additional
repositories, activating Docker Scout for specific repositories, and removing
the integration if needed. To learn more, refer to the [Amazon ECR integration
documentation](./integrations/registry/ecr.md).
#### Sysdig integration
The new Sysdig integration gives you real-time security insights for your
Kubernetes runtime environments.
Enabling this integration helps you address and prioritize risks for images
used to run your production workloads. It also helps reduce monitoring noise,
by automatically excluding vulnerabilities in programs that are never loaded
into memory, using VEX documents.
For more information and getting started, see [Sysdig integration
documentation](./integrations/environment/sysdig.md).
#### JFrog Artifactory integration
The new JFrog Artifactory integration enables automatic image analysis on
Artifactory registries.
![Animation of how to integrate Artifactory](./images/release-notes/artifactory-agent.gif)
The integration involves deploying a Docker Scout Artifactory agent that polls
for new images, performs analysis, and uploads results to Docker Scout, all
while preserving the integrity of image data. Learn more in the [Artifactory
integration documentation](./integrations/registry/artifactory.md)
### Known limitations
- Image analysis only works for Linux images
- Docker Scout can't process images larger than 12GB in compressed size
- Creating an image SBOM (part of image analysis) has a timeout limit of 4 minutes

View File

@ -4,8 +4,6 @@ description: Learn about the Docker Scout subscriptions plans and features
keywords: subscription, free, team, business, features
---
{{< include "scout-early-access.md" >}}
This page provides an overview of the subscription plans for Docker Scout. To compare features available for each plan, see [Docker Scout Pricing](https://docker.com/products/docker-scout).
## Docker Scout Free
@ -40,4 +38,4 @@ Docker Scout Business includes:
- All the features available in Docker Scout Team
- Unlimited Docker Scout-enabled repositories
You can [contact sales](https://www.docker.com/products/docker-scout/) to buy Docker Scout Business.
You can [contact sales](https://www.docker.com/products/docker-scout/) to buy Docker Scout Business.

View File

@ -616,7 +616,7 @@ Reference:
title: docker run
- path: /engine/reference/commandline/save/
title: docker save
- sectiontitle: docker scout (Early Access)
- sectiontitle: docker scout
section:
- path: /engine/reference/commandline/scout/
title: docker scout
@ -1367,6 +1367,68 @@ Manuals:
path: /desktop/extensions-sdk/dev/api/dashboard-routes-navigation/
- title: API Reference
path: /desktop/extensions-sdk/dev/api/reference/README/
- sectiontitle: Docker Scout
section:
- path: /scout/
title: Overview
- path: /scout/quickstart/
title: Quickstart
- sectiontitle: Explore Docker Scout
section:
- path: /scout/dashboard/
title: Dashboard
- path: /scout/image-details-view/
title: Image details view
- path: /scout/image-analysis/
title: Image analysis
- path: /scout/local-fs/
title: Analyze local files
- path: /scout/sbom/
title: SBOM
- path: /scout/advisory-db-sources/
title: Advisory database
- path: /scout/data-handling/
title: Data handling
- sectiontitle: Policy Evaluation
section:
- path: /scout/policy/
title: Overview
- path: /scout/policy/view/
title: View policy status
- sectiontitle: Integrations
section:
- title: Overview
path: /scout/integrations/
- sectiontitle: Environment monitoring
section:
- title: Overview
path: /scout/integrations/environment/
- title: Sysdig
path: /scout/integrations/environment/sysdig/
- title: Generic
path: /scout/integrations/environment/cli/
- sectiontitle: Container registries
section:
- title: Artifactory
path: /scout/integrations/registry/artifactory/
- title: Elastic Container Registry
path: /scout/integrations/registry/ecr/
- sectiontitle: Continuous integration
section:
- title: GitHub Actions
path: /scout/integrations/ci/gha/
- title: GitLab
path: /scout/integrations/ci/gitlab/
- title: Microsoft Azure DevOps Pipelines
path: /scout/integrations/ci/azure/
- title: Circle CI
path: /scout/integrations/ci/circle-ci/
- title: Jenkins
path: /scout/integrations/ci/jenkins/
- path: /scout/release-notes/
title: Release notes
- sectiontitle: Docker Engine
section:
- path: /engine/
@ -1972,63 +2034,6 @@ Manuals:
- path: /docker-hub/release-notes/
title: Release notes
- sectiontitle: Docker Scout (Early Access)
section:
- path: /scout/
title: Overview
- path: /scout/quickstart/
title: Quickstart
- path: /scout/image-details-view/
title: Image details view
- path: /scout/image-analysis/
title: Image analysis
- path: /scout/dashboard/
title: Dashboard
- path: /scout/local-fs/
title: Analyze local files
- path: /scout/advisory-db-sources/
title: Advisory database
- path: /scout/data-handling/
title: Data handling
- path: /scout/sbom/
title: SBOM
- sectiontitle: Policy
section:
- path: /scout/policy/
title: Overview
- path: /scout/policy/view/
title: View policy status
- sectiontitle: Integrations
section:
- title: Overview
path: /scout/integrations/
- sectiontitle: Environment monitoring
section:
- title: Overview
path: /scout/integrations/environment/
- title: Sysdig
path: /scout/integrations/environment/sysdig/
- title: Generic
path: /scout/integrations/environment/cli/
- sectiontitle: Container registries
section:
- title: Artifactory
path: /scout/integrations/registry/artifactory/
- title: Elastic Container Registry
path: /scout/integrations/registry/ecr/
- sectiontitle: Continuous integration
section:
- title: GitHub Actions
path: /scout/integrations/ci/gha/
- title: GitLab
path: /scout/integrations/ci/gitlab/
- title: Microsoft Azure DevOps Pipelines
path: /scout/integrations/ci/azure/
- title: Circle CI
path: /scout/integrations/ci/circle-ci/
- title: Jenkins
path: /scout/integrations/ci/jenkins/
- sectiontitle: Docker Admin (Early Access)
section:
- path: /admin/

View File

@ -6,6 +6,7 @@
{{ $params := (urls.Parse $imagePath).Query }}
{{ $width := index $params "w" }}
{{ $height := index $params "h" }}
{{ $border := index $params "border" }}
<div
@ -23,7 +24,7 @@
height="{{ index . 0 }}"
{{ end }}
{{ with .Title }}title="{{ . }}"{{ end }}
class="rounded mx-auto"
class="rounded mx-auto{{ with $border }} border border-divider-light dark:border-divider-dark{{end}}"
/>
<template x-teleport="body">
<div

View File

@ -42,7 +42,69 @@
</div>
{{ end }}
</div>
<div class="mx-6 grid grid-cols-3 gap-4 sm:flex sm:flex-col xl:grid-cols-2">
<div class="mx-6 bg-gradient-to-b from-black to-green-light-800 shadow-xl p-12 text-white grid gap-6 grid-cols-2 sm:grid-cols-1 items-center border border-green-light">
<div>
<svg class="max-w-[500px]" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 1612.62 198.34">
<title>Docker Scout</title>
<defs>
<style>
.cls-1,
.cls-2 {
fill: #2e7f74;
}
.cls-2 {
opacity: .5;
}
</style>
</defs>
<g>
<path class="cls-1"
d="m1128.74,117.39c-6.68-3.61-15.77-6.41-27.29-8.4-8.44-1.53-14.93-3.26-19.46-5.18-4.53-1.92-7.68-4.1-9.44-6.56-1.77-2.45-2.65-5.37-2.65-8.75,0-4.91,2.45-8.94,7.37-12.09,4.91-3.14,11.36-4.72,19.34-4.72,6.29,0,11.89.96,16.81,2.88,4.91,1.92,9.29,4.95,13.12,9.09,1.84,2,4.1,3.22,6.79,3.68,2.68.46,5.03,0,7.02-1.38,2.3-1.38,3.57-3.26,3.8-5.64.23-2.38-.5-4.64-2.19-6.79-4.6-5.83-10.67-10.48-18.19-13.93-7.52-3.45-16.43-5.18-26.71-5.18-8.14,0-15.7,1.31-22.68,3.92-6.99,2.61-12.63,6.53-16.92,11.74-4.3,5.22-6.45,11.74-6.45,19.57,0,8.6,3.57,15.97,10.71,22.1,7.14,6.14,18.46,10.52,33.96,13.12,11.97,2,20.45,4.76,25.44,8.29,4.99,3.53,7.48,7.91,7.48,13.12-.15,5.38-2.73,9.87-7.71,13.47-4.99,3.61-12.78,5.41-23.37,5.41-7.22,0-13.82-1.19-19.8-3.57-5.99-2.38-10.67-5.56-14.05-9.56-1.69-1.84-3.8-2.91-6.33-3.22-2.53-.31-5.03.46-7.48,2.3-2.15,1.69-3.38,3.84-3.68,6.45-.31,2.61.46,4.92,2.3,6.91,5.37,5.84,12.55,10.33,21.53,13.47,8.98,3.15,18.23,4.72,27.75,4.72,10.13,0,18.88-1.61,26.25-4.84,7.37-3.22,13.08-7.56,17.15-13.01,4.07-5.45,6.1-11.78,6.1-19,0-5.83-1.42-11.13-4.26-15.89-2.84-4.76-7.6-8.94-14.28-12.55Z" />
<path class="cls-1"
d="m1238.23,59.83c-7.83-3.6-16.35-5.41-25.56-5.41-11.97,0-22.53,2.8-31.66,8.41-9.13,5.6-16.35,13.24-21.64,22.91-5.3,9.67-7.94,20.65-7.94,32.93s2.72,23.03,8.17,32.7c5.45,9.67,12.93,17.31,22.45,22.91,9.52,5.61,20.34,8.4,32.47,8.4,16.73,0,30.7-5.14,41.91-15.43,1.84-1.84,2.61-3.91,2.3-6.22-.31-2.3-1.46-4.38-3.45-6.22-1.84-1.38-3.84-1.99-5.99-1.84-2.15.15-4.3,1.08-6.45,2.76-3.68,3.22-7.87,5.61-12.55,7.14-4.68,1.54-9.94,2.3-15.77,2.3-8.6,0-16.23-2.03-22.91-6.1-6.68-4.07-11.9-9.59-15.66-16.58-3.76-6.98-5.64-14.93-5.64-23.83s1.76-17.31,5.3-24.29c3.53-6.98,8.48-12.47,14.85-16.46,6.37-3.99,13.78-5.99,22.22-5.99,12.74,0,23.33,4.76,31.78,14.28,1.84,2,3.88,3.19,6.1,3.57,2.22.39,4.26-.04,6.1-1.27,2.3-1.69,3.72-3.64,4.26-5.87.54-2.22-.12-4.41-1.96-6.56-5.99-7.21-12.89-12.62-20.72-16.23Z" />
<path class="cls-1"
d="m1366.02,62.71c-9.52-5.53-20.42-8.29-32.7-8.29s-23.45,2.76-33.04,8.29c-9.6,5.53-17.15,13.12-22.68,22.79s-8.29,20.72-8.29,33.16,2.76,23.26,8.29,32.93,13.08,17.27,22.68,22.8c9.59,5.53,20.61,8.29,33.04,8.29s23.22-2.76,32.81-8.29c9.59-5.53,17.15-13.12,22.68-22.8,5.53-9.67,8.29-20.64,8.29-32.93-.16-12.43-2.99-23.49-8.52-33.16s-13.05-17.27-22.57-22.79Zm6.22,79.78c-3.84,6.99-9.13,12.51-15.89,16.58-6.76,4.07-14.43,6.1-23.03,6.1s-16.31-2.03-23.14-6.1c-6.83-4.07-12.2-9.59-16.12-16.58-3.91-6.98-5.87-14.93-5.87-23.83s1.96-16.88,5.87-23.95c3.91-7.06,9.29-12.62,16.12-16.69,6.83-4.07,14.54-6.1,23.14-6.1s16.27,2.04,23.03,6.1c6.75,4.07,12.05,9.64,15.89,16.69,3.83,7.06,5.76,15.05,5.76,23.95s-1.92,16.85-5.76,23.83Z" />
<path class="cls-1"
d="m1517.07,55.57c-2.92,0-5.26.89-7.02,2.65-1.77,1.77-2.65,4.11-2.65,7.02v67.01c0,6.3-1.69,11.86-5.07,16.69-3.38,4.84-7.98,8.67-13.82,11.51-5.84,2.84-12.36,4.26-19.57,4.26s-14.28-1.5-20.26-4.49c-5.99-2.99-10.75-7.44-14.28-13.36-3.53-5.91-5.3-13.55-5.3-22.91v-58.72c0-2.76-.92-5.07-2.76-6.91-1.84-1.84-4.14-2.76-6.91-2.76s-5.07.92-6.91,2.76-2.76,4.14-2.76,6.91v58.72c0,12.74,2.45,23.49,7.37,32.24,4.91,8.75,11.63,15.39,20.15,19.92,8.52,4.53,18.23,6.79,29.13,6.79,9.98,0,19.03-2.22,27.17-6.68,5.34-2.92,9.93-6.53,13.82-10.8v6.2c0,3.07.88,5.49,2.65,7.25,1.76,1.77,4.11,2.65,7.02,2.65s5.3-.88,7.14-2.65c1.84-1.76,2.76-4.18,2.76-7.25v-106.38c0-2.91-.92-5.26-2.76-7.02-1.84-1.76-4.22-2.65-7.14-2.65Z" />
<path class="cls-1"
d="m1610.09,164.94c-1.69-1.84-3.76-2.76-6.22-2.76h-6.91c-6.45,0-11.78-2.38-16-7.14-4.22-4.76-6.33-10.74-6.33-17.96v-60.1h23.95c2.61,0,4.76-.81,6.45-2.42,1.69-1.61,2.53-3.57,2.53-5.87,0-2.45-.85-4.49-2.53-6.1-1.69-1.61-3.84-2.42-6.45-2.42h-23.95V25.18c0-2.76-.92-5.07-2.76-6.91-1.84-1.84-4.14-2.76-6.91-2.76-2.92,0-5.26.92-7.02,2.76-1.77,1.84-2.65,4.14-2.65,6.91v35h-13.59c-2.61,0-4.76.81-6.45,2.42-1.69,1.61-2.53,3.65-2.53,6.1,0,2.3.84,4.26,2.53,5.87,1.69,1.61,3.84,2.42,6.45,2.42h13.59v60.1c0,8.44,1.8,16.04,5.41,22.8,3.6,6.76,8.56,12.05,14.85,15.89,6.29,3.84,13.43,5.76,21.41,5.76h4.61c3.22,0,5.87-.88,7.94-2.65,2.07-1.76,3.11-4.1,3.11-7.02,0-2.76-.84-5.07-2.53-6.91Z" />
</g>
<path class="cls-1"
d="m379.9.04c-3.34,0-6.06,1.13-8.24,3.34-2.18,2.21-3.26,5.05-3.26,8.43v56.47c-11.21-9.26-24.14-13.94-38.85-13.94-17.1,0-31.73,6.18-43.84,18.57-12.11,12.35-18.13,27.3-18.13,44.82s6.06,32.43,18.13,44.82c12.11,12.35,26.7,18.57,43.84,18.57s31.56-6.18,43.84-18.57c12.11-12.23,18.13-27.17,18.13-44.82V11.81c0-3.38-1.11-6.22-3.38-8.43-2.27-2.21-4.99-3.34-8.24-3.34Zm-14.54,133.06c-2.02,4.8-4.78,9.02-8.28,12.61-3.5,3.63-7.62,6.47-12.32,8.6-4.74,2.13-9.76,3.17-15.16,3.17s-10.55-1.04-15.29-3.17c-4.74-2.13-8.82-4.97-12.28-8.56-3.46-3.59-6.22-7.8-8.24-12.6-2.02-4.84-3.05-9.98-3.05-15.4s1.03-10.56,3.05-15.4c2.02-4.84,4.78-9.01,8.24-12.6,3.46-3.59,7.58-6.43,12.28-8.56,4.74-2.13,9.81-3.17,15.29-3.17s10.42,1.04,15.16,3.17c4.74,2.13,8.82,4.97,12.32,8.6s6.26,7.85,8.28,12.6c2.02,4.8,3.05,9.89,3.05,15.32s-1.03,10.56-3.05,15.32v.08Zm521.1-60.14c-12.24-12.35-26.87-18.57-43.84-18.57s-31.73,6.18-43.84,18.57c-12.11,12.35-18.13,27.3-18.13,44.83s6.06,32.43,18.13,44.82c12.11,12.35,26.7,18.57,43.84,18.57,15.57,0,29.04-5.13,40.5-15.4,2.22-2.34,3.34-5.18,3.34-8.47s-1.07-6.22-3.26-8.43c-2.18-2.21-4.94-3.34-8.24-3.34-2.88.08-5.44,1.04-7.62,2.96-3.46,3.01-7.21,5.3-11.29,6.8-4.08,1.5-8.53,2.25-13.39,2.25-4.29,0-8.41-.67-12.32-2.04-3.92-1.38-7.58-3.26-10.84-5.72-3.3-2.46-6.14-5.38-8.57-8.85-2.43-3.42-4.28-7.22-5.52-11.39h87.64c3.25,0,5.97-1.13,8.24-3.34,2.27-2.21,3.38-5.05,3.38-8.43,0-8.76-1.53-16.9-4.53-24.37-3.01-7.51-7.59-14.32-13.6-20.41l-.08-.04Zm-81.13,33.06c1.2-4.13,3.01-7.93,5.44-11.39,2.43-3.42,5.31-6.39,8.61-8.85,3.34-2.46,6.96-4.34,10.96-5.72,3.99-1.38,8.07-2.04,12.28-2.04s8.28.67,12.23,2.04c3.96,1.38,7.59,3.26,10.84,5.72,3.3,2.46,6.18,5.38,8.61,8.85,2.47,3.42,4.33,7.22,5.61,11.39h-74.58Zm202.51-43.7c-2.06-2.04-4.66-3.63-7.79-4.8-3.13-1.17-6.55-1.96-10.3-2.42-3.71-.46-7.21-.67-10.46-.67-7.38,0-14.3,1.21-20.81,3.63-6.51,2.42-12.53,5.88-18.05,10.39v-2.25c0-3.26-1.11-6.01-3.38-8.31-2.26-2.29-4.94-3.46-8.11-3.46s-5.98,1.17-8.24,3.46c-2.27,2.3-3.38,5.09-3.38,8.31v103.21c0,3.26,1.11,6.01,3.38,8.3,2.26,2.3,4.98,3.46,8.24,3.46s5.89-1.17,8.11-3.46c2.27-2.29,3.38-5.09,3.38-8.3v-51.63c0-5.51,1.03-10.69,3.05-15.53,2.02-4.84,4.78-9.01,8.28-12.6,3.51-3.59,7.63-6.43,12.32-8.47,4.74-2.09,9.77-3.13,15.17-3.13s10.5.96,15.16,2.84c1.85.83,3.46,1.25,4.86,1.25,1.61,0,3.13-.29,4.53-.92,1.4-.63,2.64-1.46,3.67-2.55,1.03-1.08,1.85-2.34,2.47-3.8.62-1.42.95-2.96.95-4.63,0-3.25-1.03-5.88-3.09-7.93h.04Zm-497.36,10.64c-12.24-12.35-26.86-18.57-43.84-18.57s-31.73,6.18-43.84,18.57c-12.11,12.35-18.13,27.3-18.13,44.83s6.06,32.43,18.13,44.82c12.11,12.35,26.7,18.57,43.84,18.57s31.56-6.18,43.84-18.57c12.11-12.23,18.13-27.17,18.13-44.82-.08-8.76-1.61-16.86-4.57-24.33-3.01-7.47-7.5-14.32-13.56-20.49Zm-8.03,60.14c-2.02,4.8-4.78,9.02-8.28,12.61-3.5,3.63-7.62,6.47-12.32,8.6-4.7,2.13-9.77,3.17-15.16,3.17s-10.55-1.04-15.29-3.17c-4.74-2.13-8.82-4.97-12.28-8.56-3.46-3.59-6.22-7.8-8.24-12.6-2.02-4.84-3.05-9.98-3.05-15.4s1.03-10.56,3.05-15.4c2.02-4.84,4.78-9.01,8.24-12.6,3.46-3.59,7.58-6.43,12.28-8.56,4.74-2.13,9.81-3.17,15.29-3.17s10.42,1.04,15.16,3.17c4.74,2.13,8.82,4.97,12.32,8.6s6.26,7.85,8.28,12.6c2.02,4.8,3.05,9.89,3.05,15.32s-1.03,10.56-3.05,15.32v.08Zm265.68-66.94c0-1.59-.33-3.09-.95-4.51-.62-1.42-1.44-2.71-2.47-3.8-1.03-1.09-2.27-1.96-3.67-2.55-1.4-.58-2.92-.92-4.53-.92-2.31,0-4.37.59-6.18,1.79l-66.17,44.03V11.9c0-3.34-1.11-6.14-3.38-8.43s-4.94-3.46-8.12-3.46-5.97,1.17-8.24,3.46c-2.27,2.3-3.38,5.09-3.38,8.43v157.35c0,3.26,1.11,6.05,3.38,8.39,2.27,2.34,4.99,3.51,8.24,3.51s5.89-1.17,8.12-3.51c2.27-2.34,3.38-5.13,3.38-8.39v-40.86l13.51-9.06,51.13,58.72c2.06,2.04,4.66,3.05,7.75,3.05,1.61,0,3.13-.29,4.53-.92,1.4-.58,2.64-1.46,3.67-2.55,1.03-1.09,1.85-2.34,2.47-3.8.62-1.42.95-2.96.95-4.51,0-3.09-1.07-5.84-3.21-8.26l-47.59-54.8,46.35-30.8c2.97-2.04,4.41-5.17,4.41-9.39v.08Zm-192.13,23.5c3.54-3.59,7.66-6.43,12.4-8.47,4.74-2.09,9.77-3.13,15.16-3.13,4.86,0,9.35.83,13.52,2.5,4.12,1.67,8.08,4.13,11.83,7.35,2.22,1.79,4.74,2.71,7.54,2.71,3.34,0,6.06-1.13,8.24-3.38,2.18-2.25,3.26-5.09,3.26-8.47s-1.32-6.51-4-8.93c-11.37-10.27-24.85-15.4-40.38-15.4-17.1,0-31.73,6.18-43.84,18.57-12.11,12.35-18.13,27.29-18.13,44.82s6.06,32.43,18.13,44.82c12.11,12.35,26.7,18.57,43.84,18.57,15.49,0,28.97-5.13,40.38-15.4,2.43-2.5,3.67-5.38,3.67-8.72s-1.07-6.22-3.26-8.43c-2.18-2.21-4.94-3.34-8.24-3.34-2.8.08-5.23.92-7.29,2.5-3.71,3.26-7.58,5.68-11.74,7.3-4.12,1.63-8.61,2.42-13.52,2.42-5.4,0-10.42-1.04-15.16-3.13-4.74-2.09-8.86-4.92-12.4-8.47-3.54-3.55-6.34-7.81-8.36-12.6-2.02-4.84-3.05-10.02-3.05-15.53s1.03-10.68,3.05-15.53c2.02-4.84,4.82-9.01,8.36-12.6v-.04Z" />
<path class="cls-1"
d="m987.34,171.54c0,5.27-4.14,9.41-9.52,9.41s-9.58-4.14-9.58-9.41,4.25-9.29,9.58-9.29,9.52,4.14,9.52,9.29Zm-16.72,0c0,4.14,3.06,7.42,7.25,7.42s7.08-3.29,7.08-7.37-3.01-7.48-7.14-7.48-7.2,3.35-7.2,7.42Zm5.73,4.87h-2.15v-9.29c.85-.17,2.04-.29,3.57-.29,1.76,0,2.55.29,3.23.68.51.4.91,1.13.91,2.04,0,1.02-.79,1.81-1.92,2.15v.11c.9.34,1.41,1.02,1.7,2.26.28,1.42.45,1.98.68,2.32h-2.32c-.29-.34-.46-1.19-.74-2.27-.17-1.02-.74-1.47-1.93-1.47h-1.02v3.74Zm.06-5.27h1.02c1.19,0,2.15-.4,2.15-1.36,0-.85-.62-1.42-1.98-1.42-.57,0-.96.06-1.19.12v2.66Z" />
<g>
<path class="cls-1"
d="m161.11,91.56c19.53-39.81,22.79-77.13,22.79-77.13,0,0-37.33,3.27-77.15,22.8,27.13,5.79,48.55,27.2,54.36,54.32Z" />
<path class="cls-2"
d="m161.1,121.26c-5.91,27.5-27.88,49.11-55.57,54.51l2.03,2.03c7.6,7.6,17.56,11.4,27.52,11.4s19.92-3.8,27.52-11.4c15.2-15.2,15.2-39.84,0-55.04l-1.51-1.51Z" />
<path class="cls-1"
d="m134.7,106.38c0-4.83-.8-9.48-2.29-13.81-4.27-12.47-14.15-22.35-26.62-26.62-4.34-1.49-8.98-2.29-13.81-2.29-23.56,0-42.73,19.17-42.73,42.72,0,5.79,1.16,11.32,3.26,16.37,4.34,10.41,12.68,18.76,23.09,23.09,5.05,2.1,10.57,3.26,16.37,3.26,23.56,0,42.72-19.17,42.72-42.72Z" />
<path class="cls-2"
d="m22.59,92.83c5.39-27.69,27.01-49.65,54.51-55.57l-1.43-1.43c-15.2-15.2-39.84-15.2-55.04,0-15.2,15.2-15.2,39.84,0,55.04l1.96,1.96Z" />
<path class="cls-1"
d="m22.83,121.14C3.27,160.98,0,198.34,0,198.34c0,0,37.36-3.27,77.19-22.82-27.15-5.8-48.57-27.23-54.36-54.38Z" />
</g>
</svg>
</div>
<div class="flex flex-col gap-4">
<p>
Docker Scout secures the complete software supply chain by providing image
analysis, real-time vulnerability identification, contextual remediation
recommendations, and more. Now generally available.
</p>
<div class="flex gap-4">
<a href="/scout/"
class="transition cursor-pointer duration-300 py-2 px-4 rounded bg-green-dark hover:bg-green-light-600 text-white">Docs</a>
<a href="/scout/release-notes/"
class="transition cursor-pointer duration-300 py-2 px-4 rounded bg-green-dark hover:bg-green-light-600 text-white">Release notes</a>
</div>
</div>
</div>
</div>
<div class="flex mx-auto w-[1200px] flex-col gap-4 p-6 lg:w-full">
<div class="grid grid-cols-3 gap-4 sm:flex sm:flex-col xl:grid-cols-2">
<div class="col-start-1 col-end-3 bg-white p-6 dark:bg-gray-dark-200">
<div x-data="{ selected: 'explore' }" aria-role="tabpanel">
<div aria-role="tablist" class="space-x-2">
@ -177,24 +239,6 @@
</a>
</div>
</div>
</div>
<div class="w-full bg-blue-light-700 dark:bg-blue-dark-100">
<div class="mx-auto p-12 w-[1000px] lg:w-full text-white flex items-center gap-6">
<div class="space-y-6">
<h2 class="text-3xl">Hardened Docker Desktop for Docker Business customers</h2>
<p>Two new security features have been introduced for Docker Business users, Settings Management and Enhanced
Container Isolation, as part of Docker Desktops new security model.</p>
<div>
<a href="/desktop/hardened-desktop"
class="cursor-pointer py-2 px-4 rounded bg-white hover:bg-blue-light-200 text-blue-light">Learn more</a>
</div>
</div>
<div>
<img src="/assets/images/hardened-desktop.PNG">
</div>
</div>
</div>
<div class="flex mx-auto w-[1200px] flex-col p-6 lg:w-full">
<div class="bg-white p-6 dark:bg-gray-dark-200">
<div x-data="{ selected: 'desktop' }" aria-role="tabpanel">
<div aria-role="tablist" class="space-x-2">