mirror of https://github.com/docker/docs.git
scout: health scores
Signed-off-by: David Karlsson <35727626+dvdksn@users.noreply.github.com>
This commit is contained in:
parent
d01f7f9ee1
commit
e08d1e77a7
|
@ -0,0 +1,117 @@
|
|||
---
|
||||
title: Docker Scout health scores
|
||||
description: |
|
||||
Docker Scout health scores provide a supply chain assessment for Docker Hub
|
||||
images, grading them from A to F based on various security policies.
|
||||
keywords: scout, health scores, evaluation, checks, grades, docker hub
|
||||
sitemap: false
|
||||
---
|
||||
|
||||
> **Early Access**
|
||||
>
|
||||
> Health scores is an [Early Access](/release-lifecycle/#early-access-ea)
|
||||
> feature of Docker Scout. The feature is only available to organizations
|
||||
> participating in the early access program for this feature.
|
||||
{ .restricted }
|
||||
|
||||
Docker Scout health scores provide a security assessment, and overall supply
|
||||
chain health, of images on Docker Hub, helping you determine whether an image
|
||||
meets established security best practices. The scores range from A to F, where
|
||||
A represents the highest level of security and F the lowest, offering an
|
||||
at-a-glance view of the security posture of your images.
|
||||
|
||||
Only users who are members of the organization that owns the repository, and
|
||||
have at least “read” access to the repository, can view the health score. The
|
||||
score is not visible to users outside the organization or members without
|
||||
"read" access.
|
||||
|
||||
## Scoring system
|
||||
|
||||
Health scores are determined by evaluating images against a set of Docker Scout
|
||||
[policies](./policy/_index.md). These policies align with best practices for
|
||||
the software supply chain and are recommended by Docker as foundational
|
||||
standards for images.
|
||||
|
||||
Each policy is assigned a points value. If the image is compliant with a
|
||||
policy, it is awarded the points value for that policy. The health score of an
|
||||
image is calculated based on the percentage of points achieved relative to the
|
||||
total possible points.
|
||||
|
||||
### Scoring process
|
||||
|
||||
1. Policy compliance is evaluated for the image.
|
||||
2. Points are awarded based on adherence to these policies.
|
||||
3. The points achieved percentage is calculated:
|
||||
|
||||
```text
|
||||
Percentage = (Points / Total) * 100
|
||||
```
|
||||
|
||||
4. The final score is assigned based on the percentage of points achieved, as
|
||||
shown in the following table:
|
||||
|
||||
| Points percentage (awarded out of total) | Score |
|
||||
| ---------------------------------------- | ----- |
|
||||
| More than 90% | A |
|
||||
| 71% to 90% | B |
|
||||
| 51% to 70% | C |
|
||||
| 31% to 50% | D |
|
||||
| 11% to 30% | E |
|
||||
| Less than 10% | F |
|
||||
|
||||
### Policy weights
|
||||
|
||||
The policies that influence the score, and their respective weights, are as follows:
|
||||
|
||||
| Policy | Points |
|
||||
| --------------------------------------------------------------------------------------------------------- | ------ |
|
||||
| [Fixable Critical and High Vulnerabilities](./policy/_index.md#fixable-critical-and-high-vulnerabilities) | 20 |
|
||||
| [High-Profile Vulnerabilities](./policy/_index.md#high-profile-vulnerabilities) | 20 |
|
||||
| [Supply Chain Attestations](./policy/_index.md#supply-chain-attestations) | 15 |
|
||||
| [Unapproved Base Images](./policy/_index.md#unapproved-base-images) | 15 |
|
||||
| [Outdated Base Images](./policy/_index.md#outdated-base-images) | 10 |
|
||||
| [Default Non-Root User](./policy/_index.md#default-non-root-user) | 5 |
|
||||
| [Copyleft Licenses](./policy/_index.md#copyleft-licenses) | 5 |
|
||||
|
||||
### Evaluation
|
||||
|
||||
Health scores are calculated for new images pushed to Docker Hub after the
|
||||
feature is enabled. The health scores help you maintain high security standards
|
||||
and ensure your applications are built on secure and reliable images.
|
||||
|
||||
### Repository scores
|
||||
|
||||
In addition to individual image scores (per tag or digest), each repository
|
||||
receives a health score based on the latest pushed tag, providing an overall
|
||||
view of the repository's security status.
|
||||
|
||||
### Example
|
||||
|
||||
For an image with a total possible score of 90 points:
|
||||
|
||||
- If the image only deviates from one policy (for example, the Copyleft
|
||||
Licenses policy), it might score 85 out of 90, resulting in a score of A.
|
||||
- If the image has fixable CVEs and other issues, it might score 75 out of 90,
|
||||
resulting in a score of B.
|
||||
|
||||
## Improving your health score
|
||||
|
||||
To improve the health score of an image, take steps to ensure that the image is
|
||||
compliant with the Docker Scout recommended [policies](./policy/_index.md).
|
||||
|
||||
1. Go to the [Docker Scout Dashboard](https://scout.docker.com/).
|
||||
2. Sign in using your Docker ID.
|
||||
3. Go to [Repository settings](https://scout.docker.com/settings/repos) and
|
||||
enable Docker Scout for your Docker Hub image repositories.
|
||||
4. Analyze the [policy compliance](./policy/_index.md) for your repositories,
|
||||
and take actions to ensure your images are policy-compliant.
|
||||
|
||||
Since policies are weighted differently, prioritize the policies with the
|
||||
highest scores for a greater impact on your image's overall score.
|
||||
|
||||
## Known limitations
|
||||
|
||||
Health score can currently only be evaluated for:
|
||||
|
||||
- Images with a `linux/amd64` or `linux/arm64` architecture.
|
||||
- Images up to 4GB in compressed size.
|
Loading…
Reference in New Issue