mirror of https://github.com/docker/docs.git
315 lines
12 KiB
Markdown
315 lines
12 KiB
Markdown
---
|
|
title: Docker Scout release notes
|
|
linkTitle: Platform release notes
|
|
description: Learn about the latest features of Docker Scout
|
|
keywords: docker scout, release notes, changelog, features, changes, delta, new, releases
|
|
aliases:
|
|
- /scout/release-notes/
|
|
tags: [Release notes]
|
|
---
|
|
|
|
<!-- vale Docker.We = NO -->
|
|
|
|
This page contains information about the new features, improvements, known
|
|
issues, and bug fixes in Docker Scout releases. These release notes cover the
|
|
Docker Scout platform, including the Dashboard. For CLI release notes, refer to
|
|
[Docker Scout CLI release notes](./cli.md).
|
|
|
|
Take a look at the [Docker Public Roadmap](https://github.com/docker/roadmap/projects/1)
|
|
for what's coming next.
|
|
|
|
## Q4 2024
|
|
|
|
New features and enhancements released in the fourth quarter of 2024.
|
|
|
|
### 2024-10-09
|
|
|
|
Policy Evaluation has graduated form Early Access to General Availability.
|
|
|
|
Docker Scout Dashboard UI changes:
|
|
|
|
- On the Docker Scout Dashboard, selecting a policy card now opens the policy
|
|
details page instead of the policy results page.
|
|
- The policy results page and the policy details side panel are now read-only.
|
|
Policy actions (edit, disable, delete) are now accessible from the policy
|
|
details page.
|
|
|
|
## Q3 2024
|
|
|
|
New features and enhancements released in the third quarter of 2024.
|
|
|
|
### 2024-09-30
|
|
|
|
In this release, we've changed how custom policies work. Before, custom
|
|
policies were created by copying an out-of-the-box policy. Now, you can
|
|
customize policies either by editing the default policy from a **policy type**
|
|
which acts as a template. The default policies in Docker Scout are also
|
|
implemented based on these types.
|
|
|
|
For more information, refer to [policy types](/manuals/scout/policy/_index.md#policy-types).
|
|
|
|
### 2024-09-09
|
|
|
|
This release changes how [health scores](/manuals/scout/policy/scores.md) are
|
|
calculated in Docker Scout. The health score calculation now considers optional
|
|
and custom policies that you have configured for your organization.
|
|
|
|
This means that if you have enabled, disabled, or customized any of the default
|
|
policies, Docker Scout will now take those policies into account when
|
|
calculating the health score for your organization's images.
|
|
|
|
If you haven't yet enabled Docker Scout for your organization, the health score
|
|
calculation will be based on the out-of-the-box policies.
|
|
|
|
### 2024-08-13
|
|
|
|
This release changes the out-of-the-box policies to align with the policy
|
|
configurations used to evaluate Docker Scout [health scores](/manuals/scout/policy/scores.md).
|
|
|
|
The default out-of-the-box policies are now:
|
|
|
|
- **No high-profile vulnerabilities**
|
|
- **No fixable critical or high vulnerabilities**
|
|
- **Approved Base Images**
|
|
- **Default non-root user**
|
|
- **Supply chain attestations**
|
|
- **Up-to-Date Base Images**
|
|
- **No AGPL v3 licenses**
|
|
|
|
The configurations for these policies are now the same as the configurations
|
|
used to calculate health scores. Previously, the out-of-the-box policies had
|
|
different configurations than the health score policies.
|
|
|
|
## Q2 2024
|
|
|
|
New features and enhancements released in the second quarter of 2024.
|
|
|
|
### 2024-06-27
|
|
|
|
This release introduces initial support for **Exceptions** in the Docker Scout
|
|
Dashboard. Exceptions let you suppress vulnerabilities found in your images
|
|
(false positives), using VEX documents. Attach VEX documents to images as
|
|
attestations, or embed them on image filesystems, and Docker Scout will
|
|
automatically detect and incorporate the VEX statements into the image analysis
|
|
results.
|
|
|
|
The new [Exceptions page](https://scout.docker.com/reports/vex/) lists all
|
|
exceptions affecting images in your organization. You can also go to the image
|
|
view in the Docker Scout Dashboard to see all exceptions that apply to a given
|
|
image.
|
|
|
|
For more information, see [Manage vulnerability exceptions](/manuals/scout/explore/exceptions.md).
|
|
|
|
### 2024-05-06
|
|
|
|
New HTTP endpoint that lets you scrape data from Docker Scout with Prometheus,
|
|
to create your own vulnerability and policy dashboards with Grafana.
|
|
For more information, see [Docker Scout metrics exporter](/manuals/scout/explore/metrics-exporter.md).
|
|
|
|
## Q1 2024
|
|
|
|
New features and enhancements released in the first quarter of 2024.
|
|
|
|
### 2024-03-29
|
|
|
|
The **No high-profile vulnerabilities** policy now reports the `xz` backdoor
|
|
vulnerability [CVE-2024-3094](https://scout.docker.com/v/CVE-2024-3094). Any
|
|
images in your Docker organization containing the version of `xz/liblzma` with
|
|
the backdoor will be non-compliant with the **No high-profile vulnerabilities**
|
|
policy.
|
|
|
|
### 2024-03-20
|
|
|
|
The **No fixable critical or high vulnerabilities** policy now supports a
|
|
**Fixable vulnerabilities only** configuration option, which lets you decide
|
|
whether or not to only flag vulnerabilities with an available fix version.
|
|
|
|
### 2024-03-14
|
|
|
|
The **All critical vulnerabilities** policy has been removed.
|
|
The **No fixable critical or high vulnerabilities** policy provides similar functionality,
|
|
and will be updated in the future to allow for more extensive customization,
|
|
making the now-removed **All critical vulnerabilities** policy redundant.
|
|
|
|
### 2024-01-26
|
|
|
|
**Azure Container Registry** integration graduated from
|
|
[Early Access](../../release-lifecycle.md#early-access-ea) to
|
|
[General Availability](../../release-lifecycle.md#genera-availability-ga).
|
|
|
|
For more information and setup instructions, see
|
|
[Integrate Azure Container Registry](../integrations/registry/acr.md).
|
|
|
|
### 2024-01-23
|
|
|
|
New **Approved Base Images** policy, which lets you restrict which base
|
|
images you allow in your builds. You define the allowed base images using a
|
|
pattern. Base images whose image reference don't match the specified patterns
|
|
cause the policy to fail.
|
|
|
|
### 2024-01-12
|
|
|
|
New **Default non-root user** policy, which flags images that would run as the
|
|
`root` superuser with full system administration privileges by default.
|
|
Specifying a non-root default user for your images can help strengthen your
|
|
runtime security.
|
|
|
|
### 2024-01-11
|
|
|
|
[Beta](../../release-lifecycle.md#beta) launch of a new GitHub app for integrating
|
|
Docker Scout with your source code management, and a remediation feature for
|
|
helping you improve policy compliance.
|
|
|
|
Remediation is a new capability for Docker Scout to provide contextual,
|
|
recommended actions based on policy evaluation results on how you can improve
|
|
compliance.
|
|
|
|
The GitHub integration enhances the remediation feature. With the integration
|
|
enabled, Docker Scout is able to connect analysis results to the source. This
|
|
additional context about how your images are built is used to generate better,
|
|
more precise recommendations.
|
|
|
|
For more information about the types of recommendations that Docker Scout can
|
|
provide to help you improve policy compliance, see
|
|
[Remediation](../policy/remediation.md).
|
|
|
|
For more information about how to authorize the Docker Scout GitHub app on your
|
|
source repositories, see
|
|
[Integrate Docker Scout with GitHub](../integrations/source-code-management/github.md).
|
|
|
|
## Q4 2023
|
|
|
|
New features and enhancements released in the fourth quarter of 2023.
|
|
|
|
### 2023-12-20
|
|
|
|
**Azure Container Registry** integration graduated from
|
|
[Beta](../../release-lifecycle.md#beta) to
|
|
[Early Access](../../release-lifecycle.md#early-access-ea).
|
|
|
|
For more information and setup instructions, see
|
|
[Integrate Azure Container Registry](../integrations/registry/acr.md).
|
|
|
|
### 2023-12-06
|
|
|
|
New [SonarQube](https://www.sonarsource.com/products/sonarqube/) integration
|
|
and related policy. SonarQube is an open-source platform for continuous
|
|
inspection of code quality. This integration lets you add SonarQube's quality
|
|
gates as a policy evaluation in Docker Scout. Enable the integration, push your
|
|
images, and see the SonarQube quality gate conditions surfaced in the new
|
|
**SonarQube quality gates passed** policy.
|
|
|
|
### 2023-12-01
|
|
|
|
[Beta](../../release-lifecycle.md#beta) release of a new **Azure Container
|
|
Registry** (ACR) integration, which lets Docker Scout pull and analyze images
|
|
in ACR repositories automatically.
|
|
|
|
To learn more about the integration and how to get started, see
|
|
[Integrate Azure Container Registry](../integrations/registry/acr.md).
|
|
|
|
### 2023-11-21
|
|
|
|
New **configurable policies** feature, which enables you to tweak the
|
|
out-of-the-box policies according to your preferences, or disable them entirely
|
|
if they don't quite match your needs. Some examples of how you can adapt
|
|
policies for your organization include:
|
|
|
|
- Change the severity-thresholds that vulnerability-related policies use
|
|
- Customize the list of "high-profile vulnerabilities"
|
|
- Add or remove software licenses to flag as "copyleft"
|
|
|
|
For more information, see [Configurable policies](../policy/configure.md).
|
|
|
|
### 2023-11-10
|
|
|
|
New **Supply chain attestations** policy for helping you track whether your
|
|
images are built with SBOM and provenance attestations. Adding attestations to
|
|
images is a good first step in improving your supply chain conduct, and is
|
|
often a prerequisite for doing more.
|
|
|
|
### 2023-11-01
|
|
|
|
New **No high-profile vulnerabilities** policy, which ensures your artifacts are
|
|
free from a curated list of vulnerabilities widely recognized to be risky.
|
|
|
|
### 2023-10-04
|
|
|
|
This marks the General Availability (GA) release of Docker Scout.
|
|
|
|
The following new features are included in this release:
|
|
|
|
- [Policy Evaluation](#policy-evaluation) (Early Access)
|
|
- [Amazon ECR integration](#amazon-ecr-integration)
|
|
- [Sysdig integration](#sysdig-integration)
|
|
- [JFrog Artifactory integration](#jfrog-artifactory-integration)
|
|
|
|
#### Policy evaluation
|
|
|
|
Policy Evaluation is an early access feature that helps you ensure software
|
|
integrity and track how your artifacts are doing over time. This release ships
|
|
with four out-of-the-box policies, enabled by default for all organizations.
|
|
|
|

|
|
|
|
- **Base images not up-to-date** evaluates whether the base images are out of
|
|
date, and require updating. Up-to-date base images help you ensure that your
|
|
environments are reliable and secure.
|
|
- **Critical and high vulnerabilities with fixes** reports if there are
|
|
vulnerabilities with critical or high severity in your images, and where
|
|
there's a fix version available that you can upgrade to.
|
|
- **All critical vulnerabilities** looks out for any vulnerabilities of
|
|
critical severity found in your images.
|
|
- **Packages with AGPLv3, GPLv3 license** helps you catch possibly unwanted
|
|
copyleft licenses used in your images.
|
|
|
|
You can view and evaluate policy status for images using the Docker Scout
|
|
Dashboard and the `docker scout policy` CLI command. For more information,
|
|
refer to the [Policy Evaluation documentation](/scout/policy/).
|
|
|
|
#### Amazon ECR integration
|
|
|
|
The new Amazon Elastic Container Registry (ECR) integration enables image
|
|
analysis for images hosted in ECR repositories.
|
|
|
|
You set up the integration using a pre-configured CloudFormation stack template
|
|
that bootstraps the necessary AWS resources in your account. Docker Scout
|
|
automatically analyzes images that you push to your registry, storing only the
|
|
metadata about the image contents, and not the container images themselves.
|
|
|
|
The integration offers a straightforward process for adding additional
|
|
repositories, activating Docker Scout for specific repositories, and removing
|
|
the integration if needed. To learn more, refer to the [Amazon ECR integration
|
|
documentation](../integrations/registry/ecr.md).
|
|
|
|
#### Sysdig integration
|
|
|
|
The new Sysdig integration gives you real-time security insights for your
|
|
Kubernetes runtime environments.
|
|
|
|
Enabling this integration helps you address and prioritize risks for images
|
|
used to run your production workloads. It also helps reduce monitoring noise,
|
|
by automatically excluding vulnerabilities in programs that are never loaded
|
|
into memory, using VEX documents.
|
|
|
|
For more information and getting started, see [Sysdig integration
|
|
documentation](../integrations/environment/sysdig.md).
|
|
|
|
#### JFrog Artifactory integration
|
|
|
|
The new JFrog Artifactory integration enables automatic image analysis on
|
|
Artifactory registries.
|
|
|
|

|
|
|
|
The integration involves deploying a Docker Scout Artifactory agent that polls
|
|
for new images, performs analysis, and uploads results to Docker Scout, all
|
|
while preserving the integrity of image data. Learn more in the [Artifactory
|
|
integration documentation](../integrations/registry/artifactory.md)
|
|
|
|
#### Known limitations
|
|
|
|
- Image analysis only works for Linux images
|
|
- Docker Scout can't process images larger than 12GB in compressed size
|
|
- Creating an image SBOM (part of image analysis) has a timeout limit of 4 minutes
|