mirror of https://github.com/docker/docs.git
scout: policy (#17951)
Signed-off-by: David Karlsson <35727626+dvdksn@users.noreply.github.com>
This commit is contained in:
parent
a6beadf6f2
commit
82b6d8e40d
Binary file not shown.
After Width: | Height: | Size: 43 KiB |
Binary file not shown.
After Width: | Height: | Size: 68 KiB |
Binary file not shown.
After Width: | Height: | Size: 74 KiB |
|
@ -0,0 +1,165 @@
|
|||
---
|
||||
title: Get started with Policy Evaluation in Docker Scout
|
||||
keywords: scout, supply chain, vulnerabilities, packages, cves, policy
|
||||
description: |
|
||||
Policies in Docker Scout let you define supply chain rules and thresholds
|
||||
for your artifacts, and track how your artifacts perform against those
|
||||
requirements over time
|
||||
---
|
||||
|
||||
> **Beta**
|
||||
>
|
||||
> Policy Evaluation is a [Beta](/release-lifecycle/#beta) feature of Docker
|
||||
> Scout. This feature is available to organizations participating in the
|
||||
> limited preview program for policies.
|
||||
>
|
||||
> If you're interested in trying out this feature, reach out using the form on
|
||||
> the [Docker Scout product page](https://docker.com/products/docker-scout)
|
||||
{ .restricted }
|
||||
|
||||
In software supply chain management, maintaining the security and reliability
|
||||
of artifacts is a top priority. Policy Evaluation in Docker Scout introduces a
|
||||
layer of control, on top of existing analysis capabilities. It lets you define
|
||||
supply chain rules for your artifacts, and helps you track how your artifacts
|
||||
perform, relative to your rules and thresholds, over time.
|
||||
|
||||
Learn how you can use Policy Evaluation to ensure that your artifacts align
|
||||
with established best practices.
|
||||
|
||||
## How it works
|
||||
|
||||
When you activate Docker Scout for a repository, images that you push are
|
||||
[automatically analyzed](../advanced-image-analysis.md). The analysis gives you
|
||||
insights about the composition of your images, including what packages they
|
||||
contain, and what vulnerabilities they're exposed to. Policy Evaluation builds
|
||||
on top of the image analysis feature, interpreting the analysis results against
|
||||
the rules defined by policies.
|
||||
|
||||
A policy defines one or more criteria that your artifacts should fulfill. For
|
||||
example, one of the default policies in Docker Scout is the **Critical
|
||||
vulnerabilities** policy, which proclaims that your artifacts must not contain
|
||||
any critical vulnerabilities. If an artifact contains one or more
|
||||
vulnerabilities with a critical severity, that artifact fails the evaluation.
|
||||
|
||||
In Docker Scout, policies are designed to help you ratchet forward your
|
||||
security and supply chain stature. Where other tools focus on providing a pass
|
||||
or fail status, Docker Scout policies visualizes how small, incremental changes
|
||||
affect policy status, even when your artifacts don't meet the policy
|
||||
requirements (yet). By tracking how the fail gap changes over time, you more
|
||||
easily see whether your artifact is improving or deteriorating relative to
|
||||
policy.
|
||||
|
||||
Policies don't necessarily have to be related to application security and
|
||||
vulnerabilities. You can use policies to measure and track other aspects of
|
||||
supply chain management as well, such as base image dependencies and
|
||||
open-source licenses.
|
||||
|
||||
## Default policies
|
||||
|
||||
Docker Scout ships the following three out-of-the-box policies:
|
||||
|
||||
- [Critical and high vulnerabilities with fixes](#critical-and-high-vulnerabilities-with-fixes)
|
||||
- [Critical vulnerabilities](#critical-vulnerabilities)
|
||||
- [Packages with GPL3+ licenses](#packages-with-gpl3-licenses)
|
||||
|
||||
These policies are turned on by default for Scout-enabled repositories. There's
|
||||
currently no way to turn off or configure these policies.
|
||||
|
||||
### Critical and high vulnerabilities with fixes
|
||||
|
||||
This policy requires that your artifacts aren't exposed to known
|
||||
vulnerabilities with a critical or high severity, and where there's a fix
|
||||
version available. Essentially, this means that there's an easy fix that you
|
||||
can deploy for images that fail this policy: upgrade the vulnerable package to
|
||||
a version containing a fix for the vulnerability.
|
||||
|
||||
This policy only flags vulnerabilities that were published more than 30
|
||||
days ago, with the rationale that newly discovered vulnerabilities
|
||||
shouldn't cause your evaluations to fail until you've had a chance to
|
||||
address them.
|
||||
|
||||
This policy is unfulfilled if an artifact is affected by one or more critical-
|
||||
or high-severity vulnerability, where a fix version is available.
|
||||
|
||||
### Critical vulnerabilities
|
||||
|
||||
This policy requires that your artifacts contain no known critical
|
||||
vulnerabilities. The policy is unfulfilled if your artifact contains one or
|
||||
more critical vulnerabilities.
|
||||
|
||||
This policy flags all critical vulnerabilities, whether or not there's a fix
|
||||
version available.
|
||||
|
||||
### Packages with GPL3+ licenses
|
||||
|
||||
This policy requires that your artifacts don't contain packages distributed
|
||||
under a GPL3+ [copyleft](https://en.wikipedia.org/wiki/Copyleft) license.
|
||||
|
||||
This policy is unfulfilled if your artifacts contain one or more packages with
|
||||
a violating license.
|
||||
|
||||
## View policy status
|
||||
|
||||
The **Overview** tab of the [Docker Scout Dashboard](https://scout.docker.com/)
|
||||
displays a summary of recent changes in policy for your repositories.
|
||||
This summary shows images that have seen the most change in their policy
|
||||
evaluation between the most recent image and the previous image.
|
||||
|
||||

|
||||
|
||||
### Policy status per repository
|
||||
|
||||
The **Images** tab shows the current policy status, and recent policy trend,
|
||||
for all images in the selected environment. The **Policy status** column in the
|
||||
list shows:
|
||||
|
||||
- Number of fulfilled policies versus the total number of policies
|
||||
- Recent policy trends
|
||||
|
||||

|
||||
|
||||
The policy trend, denoted by the directional arrows, indicates whether an image
|
||||
is better, worse, or unchanged in terms of policy, compared to the previous
|
||||
image in the same environment.
|
||||
|
||||
- The green arrow pointing upwards shows the number of policies that got better
|
||||
in the latest pushed image.
|
||||
- The red arrow pointing downwards shows the number of policies that got worse
|
||||
in the latest pushed image.
|
||||
- The bidirectional gray arrow shows the number of policies that were unchanged
|
||||
in the latest version of this image.
|
||||
|
||||
If you select a repository, you can open the **Policy** tab for a detailed
|
||||
description of the policy delta for the most recently analyzed image and its
|
||||
predecessor.
|
||||
|
||||
### Detailed evaluation results
|
||||
|
||||
To view the full results of an evaluation of an image, select the image in
|
||||
the Docker Scout Dashboard and open the **Policy** tab. This shows a
|
||||
breakdown for all policy violations for the current image.
|
||||
|
||||

|
||||
|
||||
## Remediate policy violations
|
||||
|
||||
To remediate issues in your artifacts that cause policy violations, you can use
|
||||
the tag view in the Docker Scout Dashboard.
|
||||
|
||||
1. Go to the **Images** view in the Docker Scout Dashboard.
|
||||
2. In the list of repositories, select the image that you want to improve.
|
||||
3. Select an image.
|
||||
4. Open the **Policy** tab.
|
||||
|
||||
The **Policy** tab shows you all of the policy violations for the current
|
||||
image. Expand the policy menus to learn which packages in the image are
|
||||
causing the evaluation to fail.
|
||||
|
||||
For vulnerability-related policies, if a package has an available fix version
|
||||
that removes the vulnerability, that fix version is displayed in the policy
|
||||
list. To remediate the issue, upgrade the package version to the fix version.
|
||||
|
||||
For licensing-related policies, the list shows all packages whose license
|
||||
doesn't meet the policy criteria. To fix the issue, look for an alternative
|
||||
package distributed under a more appropriate license, or cut the dependency by
|
||||
reimplementing the functionality in your own code.
|
|
@ -1909,6 +1909,8 @@ Manuals:
|
|||
title: Advisory Database
|
||||
- path: /scout/data-handling/
|
||||
title: Data handling
|
||||
- path: /scout/policy/
|
||||
title: Policy
|
||||
- sectiontitle: Integrations
|
||||
section:
|
||||
- title: Overview
|
||||
|
|
Loading…
Reference in New Issue