mirror of https://github.com/docker/docs.git
Draft
Signed-off-by: Chris Chinchilla <chris.ward@docker.com> Draft Signed-off-by: Chris Chinchilla <chris.ward@docker.com> Draft Signed-off-by: Chris Chinchilla <chris.ward@docker.com> Add redirect Signed-off-by: Chris Chinchilla <chris.ward@docker.com> Update screenshot Signed-off-by: Chris Chinchilla <chris.ward@docker.com> Update scout/web-app.md Co-authored-by: Allie Sadler <102604716+aevesdocker@users.noreply.github.com> Update scout/web-app.md Co-authored-by: Allie Sadler <102604716+aevesdocker@users.noreply.github.com> Update scout/web-app.md Co-authored-by: Allie Sadler <102604716+aevesdocker@users.noreply.github.com> Update scout/web-app.md Co-authored-by: Allie Sadler <102604716+aevesdocker@users.noreply.github.com> Update scout/web-app.md Co-authored-by: Allie Sadler <102604716+aevesdocker@users.noreply.github.com> Remove todos Signed-off-by: Chris Chinchilla <chris.ward@docker.com> Update image Signed-off-by: Chris Chinchilla <chris.ward@docker.com>
This commit is contained in:
parent
aaa6722e6c
commit
edf428b00e
|
@ -1885,6 +1885,8 @@ manuals:
|
||||||
title: Image details view
|
title: Image details view
|
||||||
- path: /scout/advanced-image-analysis/
|
- path: /scout/advanced-image-analysis/
|
||||||
title: Advanced image analysis
|
title: Advanced image analysis
|
||||||
|
- path: /scout/web-app/
|
||||||
|
title: Web App
|
||||||
- path: /scout/artifactory/
|
- path: /scout/artifactory/
|
||||||
title: Artifactory integration
|
title: Artifactory integration
|
||||||
- path: /scout/advisory-db-sources/
|
- path: /scout/advisory-db-sources/
|
||||||
|
|
Binary file not shown.
After Width: | Height: | Size: 205 KiB |
Binary file not shown.
After Width: | Height: | Size: 217 KiB |
Binary file not shown.
After Width: | Height: | Size: 160 KiB |
Binary file not shown.
After Width: | Height: | Size: 195 KiB |
Binary file not shown.
After Width: | Height: | Size: 248 KiB |
Binary file not shown.
After Width: | Height: | Size: 294 KiB |
|
@ -0,0 +1,100 @@
|
||||||
|
---
|
||||||
|
description: The Docker Scout Web App helps review and share the analysis of images.
|
||||||
|
keywords: scanning, analysis, vulnerabilities, Hub, supply chain, security, report, reports, web app
|
||||||
|
title: Web App
|
||||||
|
redirect_from:
|
||||||
|
- /scout/reports/
|
||||||
|
---
|
||||||
|
|
||||||
|
{% include scout-early-access.md %}
|
||||||
|
|
||||||
|
The Docker Scout Web App helps you share the analysis of images in an organization with your team. Developers can now see an overview of their security status across all their images from both Docker Hub and Artifactory, and get remediation advice at their fingertips. It helps team members in roles such as security, compliance, and operations to know what vulnerabilities and issues they need to focus on.
|
||||||
|
|
||||||
|
## Overview
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
The **Overview** tab shows the total number of vulnerabilities across all your Scout-enabled repositories, over time. This calculation takes the most recent image in each repository to avoid including old irrelevant images.
|
||||||
|
|
||||||
|
## Images
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
The **Images** tab shows a list of images in an organization. You can search for specific repositories using the search box.
|
||||||
|
|
||||||
|
Each entry in the list shows the following details:
|
||||||
|
|
||||||
|
- The repository name for the image. Clicking the link for the repository opens the list of tags for the repository.
|
||||||
|
- The most recent version of the image and the vulnerabilities for that version. Clicking the link for the base image opens [the image layer view](#image-layer-view).
|
||||||
|
- The operating system and architecture of the image.
|
||||||
|
- The base image and version used by the repository and the vulnerabilities for that version. Clicking the link for the base image opens [the image layer view](#image-layer-view).
|
||||||
|
- The recommended fixes, which can include options such as changing tags or rebuilding an image.
|
||||||
|
- The predicted improvement to the vulnerabilities if you apply the recommended fixes.
|
||||||
|
- An action button to show implementable recommended fixes.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Repository tag list
|
||||||
|
|
||||||
|
The repository tag list shows all tags for a repository. You can search for specific tag versions using the search box.
|
||||||
|
|
||||||
|
Each entry in the list shows the following details:
|
||||||
|
|
||||||
|
- The tag version. Clicking the link for version opens [the image layer view](#image-layer-view).
|
||||||
|
- The operating system and architecture of the image.
|
||||||
|
- The vulnerabilities for the tag version.
|
||||||
|
- The last push for the tag version.
|
||||||
|
- The base image and version used by the repository and the vulnerabilities for
|
||||||
|
that version.
|
||||||
|
|
||||||
|
### Image layer view
|
||||||
|
|
||||||
|
The image layer view shows a breakdown of the Docker Scout analysis, including
|
||||||
|
an overview of the digest Secure Hash Algorithms (SHA), version, the image hierarchy (base images), image
|
||||||
|
layers, packages, and vulnerabilities.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
> **Note**
|
||||||
|
>
|
||||||
|
> You can find more details on the elements in the image layer view in [the image details view docs](./image-details-view.md).
|
||||||
|
|
||||||
|
Click the **View recommended fixes** button to see instructions to apply the recommended fixes for the image.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Packages and dependencies
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
The **Packages and dependencies** tab shows all packages and base images part of your images in an organization. You can sort the list by package name.
|
||||||
|
|
||||||
|
Each entry in the list shows the following details:
|
||||||
|
|
||||||
|
- The package name.
|
||||||
|
- The package type.
|
||||||
|
- The license(s) used by the package.
|
||||||
|
- The versions of the package used by images in the organization.
|
||||||
|
- The package type.
|
||||||
|
- The number of images that use the package.
|
||||||
|
|
||||||
|
## Vulnerabilities
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
The **Vulnerabilities** tab shows a list of all vulnerabilities from images in the organization. You can sort the list by severity and search for Common Vulnerabilities and Exposures (CVE) ID using the search box.
|
||||||
|
|
||||||
|
Each entry in the list shows the following details:
|
||||||
|
|
||||||
|
- Severity of the vulnerability.
|
||||||
|
|
||||||
|
> **Note**
|
||||||
|
>
|
||||||
|
> Docker Scout bases the calculation behind this severity level on a variety
|
||||||
|
> of sources.
|
||||||
|
|
||||||
|
- The vulnerability CVE ID.
|
||||||
|
- The package name and version affected by this CVE.
|
||||||
|
- The Common Vulnerability Scoring System (CVSS) score for the vulnerability. Docker Scout shows the highest CVSS score from multiple sources.
|
||||||
|
- The number of images in the organization that use the package affected by this CVE.
|
||||||
|
- If Docker Scout knows of a fix for the vulnerability, and if so, the package version of the fix.
|
Loading…
Reference in New Issue