mirror of https://github.com/docker/docs.git
Merge pull request #21080 from dvdksn/scoutguide-rm-footnotes
guides: scout learning path fixups
This commit is contained in:
commit
aba4ea810f
|
|
@ -1,11 +1,11 @@
|
|||
# syntax=docker/dockerfile-upstream:master
|
||||
# syntax=docker/dockerfile:1
|
||||
# check=skip=InvalidBaseImagePlatform
|
||||
|
||||
# ALPINE_VERSION sets the Alpine Linux version for all Alpine stages
|
||||
ARG ALPINE_VERSION=3.20
|
||||
# GO_VERSION sets the Go version for the base stage
|
||||
ARG GO_VERSION=1.23
|
||||
# HTML_TEST_VERSION sets the wjdp/htmltest version for HTML testing
|
||||
# HTMLTEST_VERSION sets the wjdp/htmltest version for HTML testing
|
||||
ARG HTMLTEST_VERSION=0.17.0
|
||||
|
||||
# base is the base stage with build dependencies
|
||||
|
|
|
|||
|
|
@ -29,24 +29,23 @@ params:
|
|||
|
||||
When container images are insecure, significant risks can arise. Around 60% of
|
||||
organizations have reported experiencing at least one security breach or
|
||||
vulnerability incident within a year, resulting in operational
|
||||
disruption.[^CSA] These incidents often result in considerable downtime, with
|
||||
vulnerability incident within a year, [resulting in operational
|
||||
disruption][CSA]. These incidents often result in considerable downtime, with
|
||||
44% of affected companies experiencing over an hour of downtime per event. The
|
||||
financial impact is substantial, with the average data breach cost reaching
|
||||
$4.45 million.[^IBM] This highlights the critical importance of maintaining
|
||||
financial impact is substantial, with [the average data breach cost reaching
|
||||
$4.45 million][IBM]. This highlights the critical importance of maintaining
|
||||
robust container security measures.
|
||||
|
||||
Docker Scout enhances container security by providing automated vulnerability
|
||||
detection and remediation, addressing insecure container images, and ensuring
|
||||
compliance with security standards.
|
||||
|
||||
[^CSA]: https://cloudsecurityalliance.org/blog/2023/09/21/2023-global-cloud-threat-report-cloud-attacks-are-lightning-fast
|
||||
|
||||
[^IBM]: https://www.ibm.com/reports/data-breach
|
||||
[CSA]: https://cloudsecurityalliance.org/blog/2023/09/21/2023-global-cloud-threat-report-cloud-attacks-are-lightning-fast
|
||||
[IBM]: https://www.ibm.com/reports/data-breach
|
||||
|
||||
## What you'll learn
|
||||
|
||||
- Define secure software supply chain (SSSC)
|
||||
- Define Secure Software Supply Chain (SSSC)
|
||||
- Review SBOMs and how to use them
|
||||
- Detect and monitor vulnerabilities
|
||||
|
||||
|
|
|
|||
Loading…
Reference in New Issue