docs/content/manuals/scout/release-notes/platform.md

315 lines
12 KiB
Markdown

---
title: Docker Scout release notes
linkTitle: Platform release notes
description: Learn about the latest features of Docker Scout
keywords: docker scout, release notes, changelog, features, changes, delta, new, releases
aliases:
- /scout/release-notes/
tags: [Release notes]
---
<!-- vale Docker.We = NO -->
This page contains information about the new features, improvements, known
issues, and bug fixes in Docker Scout releases. These release notes cover the
Docker Scout platform, including the Dashboard. For CLI release notes, refer to
[Docker Scout CLI release notes](./cli.md).
Take a look at the [Docker Public Roadmap](https://github.com/docker/roadmap/projects/1)
for what's coming next.
## Q4 2024
New features and enhancements released in the fourth quarter of 2024.
### 2024-10-09
Policy Evaluation has graduated form Early Access to General Availability.
Docker Scout Dashboard UI changes:
- On the Docker Scout Dashboard, selecting a policy card now opens the policy
details page instead of the policy results page.
- The policy results page and the policy details side panel are now read-only.
Policy actions (edit, disable, delete) are now accessible from the policy
details page.
## Q3 2024
New features and enhancements released in the third quarter of 2024.
### 2024-09-30
In this release, we've changed how custom policies work. Before, custom
policies were created by copying an out-of-the-box policy. Now, you can
customize policies either by editing the default policy from a **policy type**
which acts as a template. The default policies in Docker Scout are also
implemented based on these types.
For more information, refer to [policy types](/manuals/scout/policy/_index.md#policy-types).
### 2024-09-09
This release changes how [health scores](/manuals/scout/policy/scores.md) are
calculated in Docker Scout. The health score calculation now considers optional
and custom policies that you have configured for your organization.
This means that if you have enabled, disabled, or customized any of the default
policies, Docker Scout will now take those policies into account when
calculating the health score for your organization's images.
If you haven't yet enabled Docker Scout for your organization, the health score
calculation will be based on the out-of-the-box policies.
### 2024-08-13
This release changes the out-of-the-box policies to align with the policy
configurations used to evaluate Docker Scout [health scores](/manuals/scout/policy/scores.md).
The default out-of-the-box policies are now:
- **No high-profile vulnerabilities**
- **No fixable critical or high vulnerabilities**
- **Approved Base Images**
- **Default non-root user**
- **Supply chain attestations**
- **Up-to-Date Base Images**
- **No AGPL v3 licenses**
The configurations for these policies are now the same as the configurations
used to calculate health scores. Previously, the out-of-the-box policies had
different configurations than the health score policies.
## Q2 2024
New features and enhancements released in the second quarter of 2024.
### 2024-06-27
This release introduces initial support for **Exceptions** in the Docker Scout
Dashboard. Exceptions let you suppress vulnerabilities found in your images
(false positives), using VEX documents. Attach VEX documents to images as
attestations, or embed them on image filesystems, and Docker Scout will
automatically detect and incorporate the VEX statements into the image analysis
results.
The new [Exceptions page](https://scout.docker.com/reports/vex/) lists all
exceptions affecting images in your organization. You can also go to the image
view in the Docker Scout Dashboard to see all exceptions that apply to a given
image.
For more information, see [Manage vulnerability exceptions](/manuals/scout/explore/exceptions.md).
### 2024-05-06
New HTTP endpoint that lets you scrape data from Docker Scout with Prometheus,
to create your own vulnerability and policy dashboards with Grafana.
For more information, see [Docker Scout metrics exporter](/manuals/scout/explore/metrics-exporter.md).
## Q1 2024
New features and enhancements released in the first quarter of 2024.
### 2024-03-29
The **No high-profile vulnerabilities** policy now reports the `xz` backdoor
vulnerability [CVE-2024-3094](https://scout.docker.com/v/CVE-2024-3094). Any
images in your Docker organization containing the version of `xz/liblzma` with
the backdoor will be non-compliant with the **No high-profile vulnerabilities**
policy.
### 2024-03-20
The **No fixable critical or high vulnerabilities** policy now supports a
**Fixable vulnerabilities only** configuration option, which lets you decide
whether or not to only flag vulnerabilities with an available fix version.
### 2024-03-14
The **All critical vulnerabilities** policy has been removed.
The **No fixable critical or high vulnerabilities** policy provides similar functionality,
and will be updated in the future to allow for more extensive customization,
making the now-removed **All critical vulnerabilities** policy redundant.
### 2024-01-26
**Azure Container Registry** integration graduated from
[Early Access](../../release-lifecycle.md#early-access-ea) to
[General Availability](../../release-lifecycle.md#genera-availability-ga).
For more information and setup instructions, see
[Integrate Azure Container Registry](../integrations/registry/acr.md).
### 2024-01-23
New **Approved Base Images** policy, which lets you restrict which base
images you allow in your builds. You define the allowed base images using a
pattern. Base images whose image reference don't match the specified patterns
cause the policy to fail.
### 2024-01-12
New **Default non-root user** policy, which flags images that would run as the
`root` superuser with full system administration privileges by default.
Specifying a non-root default user for your images can help strengthen your
runtime security.
### 2024-01-11
[Beta](../../release-lifecycle.md#beta) launch of a new GitHub app for integrating
Docker Scout with your source code management, and a remediation feature for
helping you improve policy compliance.
Remediation is a new capability for Docker Scout to provide contextual,
recommended actions based on policy evaluation results on how you can improve
compliance.
The GitHub integration enhances the remediation feature. With the integration
enabled, Docker Scout is able to connect analysis results to the source. This
additional context about how your images are built is used to generate better,
more precise recommendations.
For more information about the types of recommendations that Docker Scout can
provide to help you improve policy compliance, see
[Remediation](../policy/remediation.md).
For more information about how to authorize the Docker Scout GitHub app on your
source repositories, see
[Integrate Docker Scout with GitHub](../integrations/source-code-management/github.md).
## Q4 2023
New features and enhancements released in the fourth quarter of 2023.
### 2023-12-20
**Azure Container Registry** integration graduated from
[Beta](../../release-lifecycle.md#beta) to
[Early Access](../../release-lifecycle.md#early-access-ea).
For more information and setup instructions, see
[Integrate Azure Container Registry](../integrations/registry/acr.md).
### 2023-12-06
New [SonarQube](https://www.sonarsource.com/products/sonarqube/) integration
and related policy. SonarQube is an open-source platform for continuous
inspection of code quality. This integration lets you add SonarQube's quality
gates as a policy evaluation in Docker Scout. Enable the integration, push your
images, and see the SonarQube quality gate conditions surfaced in the new
**SonarQube quality gates passed** policy.
### 2023-12-01
[Beta](../../release-lifecycle.md#beta) release of a new **Azure Container
Registry** (ACR) integration, which lets Docker Scout pull and analyze images
in ACR repositories automatically.
To learn more about the integration and how to get started, see
[Integrate Azure Container Registry](../integrations/registry/acr.md).
### 2023-11-21
New **configurable policies** feature, which enables you to tweak the
out-of-the-box policies according to your preferences, or disable them entirely
if they don't quite match your needs. Some examples of how you can adapt
policies for your organization include:
- Change the severity-thresholds that vulnerability-related policies use
- Customize the list of "high-profile vulnerabilities"
- Add or remove software licenses to flag as "copyleft"
For more information, see [Configurable policies](../policy/configure.md).
### 2023-11-10
New **Supply chain attestations** policy for helping you track whether your
images are built with SBOM and provenance attestations. Adding attestations to
images is a good first step in improving your supply chain conduct, and is
often a prerequisite for doing more.
### 2023-11-01
New **No high-profile vulnerabilities** policy, which ensures your artifacts are
free from a curated list of vulnerabilities widely recognized to be risky.
### 2023-10-04
This marks the General Availability (GA) release of Docker Scout.
The following new features are included in this release:
- [Policy Evaluation](#policy-evaluation) (Early Access)
- [Amazon ECR integration](#amazon-ecr-integration)
- [Sysdig integration](#sysdig-integration)
- [JFrog Artifactory integration](#jfrog-artifactory-integration)
#### Policy evaluation
Policy Evaluation is an early access feature that helps you ensure software
integrity and track how your artifacts are doing over time. This release ships
with four out-of-the-box policies, enabled by default for all organizations.
![Policy overview in Dashboard](../images/release-notes/policy-ea.webp)
- **Base images not up-to-date** evaluates whether the base images are out of
date, and require updating. Up-to-date base images help you ensure that your
environments are reliable and secure.
- **Critical and high vulnerabilities with fixes** reports if there are
vulnerabilities with critical or high severity in your images, and where
there's a fix version available that you can upgrade to.
- **All critical vulnerabilities** looks out for any vulnerabilities of
critical severity found in your images.
- **Packages with AGPLv3, GPLv3 license** helps you catch possibly unwanted
copyleft licenses used in your images.
You can view and evaluate policy status for images using the Docker Scout
Dashboard and the `docker scout policy` CLI command. For more information,
refer to the [Policy Evaluation documentation](/scout/policy/).
#### Amazon ECR integration
The new Amazon Elastic Container Registry (ECR) integration enables image
analysis for images hosted in ECR repositories.
You set up the integration using a pre-configured CloudFormation stack template
that bootstraps the necessary AWS resources in your account. Docker Scout
automatically analyzes images that you push to your registry, storing only the
metadata about the image contents, and not the container images themselves.
The integration offers a straightforward process for adding additional
repositories, activating Docker Scout for specific repositories, and removing
the integration if needed. To learn more, refer to the [Amazon ECR integration
documentation](../integrations/registry/ecr.md).
#### Sysdig integration
The new Sysdig integration gives you real-time security insights for your
Kubernetes runtime environments.
Enabling this integration helps you address and prioritize risks for images
used to run your production workloads. It also helps reduce monitoring noise,
by automatically excluding vulnerabilities in programs that are never loaded
into memory, using VEX documents.
For more information and getting started, see [Sysdig integration
documentation](../integrations/environment/sysdig.md).
#### JFrog Artifactory integration
The new JFrog Artifactory integration enables automatic image analysis on
Artifactory registries.
![Animation of how to integrate Artifactory](../images/release-notes/artifactory-agent.gif)
The integration involves deploying a Docker Scout Artifactory agent that polls
for new images, performs analysis, and uploads results to Docker Scout, all
while preserving the integrity of image data. Learn more in the [Artifactory
integration documentation](../integrations/registry/artifactory.md)
#### Known limitations
- Image analysis only works for Linux images
- Docker Scout can't process images larger than 12GB in compressed size
- Creating an image SBOM (part of image analysis) has a timeout limit of 4 minutes