scout: add faq about image analysis

Signed-off-by: David Karlsson <35727626+dvdksn@users.noreply.github.com>
This commit is contained in:
David Karlsson 2023-11-14 10:52:12 +01:00
parent 425db7cb39
commit 8c40cc29f2
1 changed files with 25 additions and 7 deletions

View File

@ -14,6 +14,8 @@ platform.
### Image metadata
Docker Scout collects the following image metadata:
- Image creation timestamp
- Image digest
- Ports exposed by the image
@ -24,8 +26,27 @@ platform.
- Operating system type and version
- Registry URL and type
Image digests are created for each layer of an image when the image is built
and pushed to a registry. They are SHA256 digests of the contents of a layer.
Docker Scout doesn't create the digests; they're read from the image manifest.
The digests are matched against your own private images and Docker's database
of public images to identify images that share the same layers. The image that
shares most of the layers is considered a base image match for the image that's
currently being analyzed.
### SBOM metadata
SBOM metadata is used to match package types and versions with public
vulnerability data to infer whether a package is considered vulnerable.
When the Docker Scout platform receives information from its advisory database
about new CVEs (and other risks, such as leaked secrets), it "overlays" this
information on the SBOM. If there's a match, the results of the match are
displayed in the user interfaces where Docker Scout data is surfaced, such as
the Docker Scout Dashboard and in Docker Desktop.
Docker Scout collects the SBOM metadata:
- Package URLs (PURL)
- Package author and description
- License IDs
@ -36,13 +57,10 @@ platform.
- The type of direct dependency
- Total package count
SBOM metadata is used to match package types and versions with public
vulnerability data to infer whether a package is considered vulnerable.
When the Docker Scout platform receives information from its advisory database
about new CVEs (and other risks, such as leaked secrets), it "overlays" this
information on the SBOM. If there's a match, the results of the match are
displayed in the user interfaces where Docker Scout data is surfaced, such as
the Docker Scout Dashboard and in Docker Desktop.
The PURLs in Docker Scout follow the
[purl-spec](https://github.com/package-url/purl-spec) specification. Package
information is derived from the contents of image, including OS-level programs
and packages, and application-level packages such as maven, npm, and so on.
### Environment metadata