mirror of https://github.com/docker/docs.git
Merge pull request #21080 from dvdksn/scoutguide-rm-footnotes
guides: scout learning path fixups
This commit is contained in:
commit
aba4ea810f
|
|
@ -1,11 +1,11 @@
|
||||||
# syntax=docker/dockerfile-upstream:master
|
# syntax=docker/dockerfile:1
|
||||||
# check=skip=InvalidBaseImagePlatform
|
# check=skip=InvalidBaseImagePlatform
|
||||||
|
|
||||||
# ALPINE_VERSION sets the Alpine Linux version for all Alpine stages
|
# ALPINE_VERSION sets the Alpine Linux version for all Alpine stages
|
||||||
ARG ALPINE_VERSION=3.20
|
ARG ALPINE_VERSION=3.20
|
||||||
# GO_VERSION sets the Go version for the base stage
|
# GO_VERSION sets the Go version for the base stage
|
||||||
ARG GO_VERSION=1.23
|
ARG GO_VERSION=1.23
|
||||||
# HTML_TEST_VERSION sets the wjdp/htmltest version for HTML testing
|
# HTMLTEST_VERSION sets the wjdp/htmltest version for HTML testing
|
||||||
ARG HTMLTEST_VERSION=0.17.0
|
ARG HTMLTEST_VERSION=0.17.0
|
||||||
|
|
||||||
# base is the base stage with build dependencies
|
# base is the base stage with build dependencies
|
||||||
|
|
|
||||||
|
|
@ -29,24 +29,23 @@ params:
|
||||||
|
|
||||||
When container images are insecure, significant risks can arise. Around 60% of
|
When container images are insecure, significant risks can arise. Around 60% of
|
||||||
organizations have reported experiencing at least one security breach or
|
organizations have reported experiencing at least one security breach or
|
||||||
vulnerability incident within a year, resulting in operational
|
vulnerability incident within a year, [resulting in operational
|
||||||
disruption.[^CSA] These incidents often result in considerable downtime, with
|
disruption][CSA]. These incidents often result in considerable downtime, with
|
||||||
44% of affected companies experiencing over an hour of downtime per event. The
|
44% of affected companies experiencing over an hour of downtime per event. The
|
||||||
financial impact is substantial, with the average data breach cost reaching
|
financial impact is substantial, with [the average data breach cost reaching
|
||||||
$4.45 million.[^IBM] This highlights the critical importance of maintaining
|
$4.45 million][IBM]. This highlights the critical importance of maintaining
|
||||||
robust container security measures.
|
robust container security measures.
|
||||||
|
|
||||||
Docker Scout enhances container security by providing automated vulnerability
|
Docker Scout enhances container security by providing automated vulnerability
|
||||||
detection and remediation, addressing insecure container images, and ensuring
|
detection and remediation, addressing insecure container images, and ensuring
|
||||||
compliance with security standards.
|
compliance with security standards.
|
||||||
|
|
||||||
[^CSA]: https://cloudsecurityalliance.org/blog/2023/09/21/2023-global-cloud-threat-report-cloud-attacks-are-lightning-fast
|
[CSA]: https://cloudsecurityalliance.org/blog/2023/09/21/2023-global-cloud-threat-report-cloud-attacks-are-lightning-fast
|
||||||
|
[IBM]: https://www.ibm.com/reports/data-breach
|
||||||
[^IBM]: https://www.ibm.com/reports/data-breach
|
|
||||||
|
|
||||||
## What you'll learn
|
## What you'll learn
|
||||||
|
|
||||||
- Define secure software supply chain (SSSC)
|
- Define Secure Software Supply Chain (SSSC)
|
||||||
- Review SBOMs and how to use them
|
- Review SBOMs and how to use them
|
||||||
- Detect and monitor vulnerabilities
|
- Detect and monitor vulnerabilities
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue