@@ -14,6 +14,13 @@ images without additional setup. Using Docker Scout policies, you can define and
1414apply rules that ensure only approved and secure images, such as those based on
1515DHIs, are used across your environments.
1616
17+ Docker Scout includes a dedicated [ ** Valid Docker Hardened Image (DHI) or DHI
18+ base
19+ image** ] ( ../../scout/policy/_index.md#valid-docker-hardened-image-dhi-or-dhi-base-image )
20+ policy type that validates whether your images are Docker Hardened Images or are
21+ built using a DHI as the base image. This policy checks for valid Docker signed
22+ verification summary attestations.
23+
1724With policy evaluation built into Docker Scout, you can monitor image compliance
1825in real time, integrate checks into your CI/CD workflows, and maintain
1926consistent standards for image security and provenance.
@@ -33,23 +40,18 @@ Docker Scout automatically evaluates policy compliance when new images are
3340pushed. Each policy includes a compliance result and a link to the affected
3441images and layers.
3542
36- ## Create policies for your DHI-based images
37-
38- To ensure that the images you build using Docker Hardened Images remain secure,
39- you can create Docker Scout policies tailored to your requirements for your own
40- repositories. These policies help enforce security standards such as preventing
41- high-severity vulnerabilities, requiring up-to-date base images, or validating
42- the presence of key metadata.
43+ ## Evaluate DHI policy compliance for your images
4344
44- Policies evaluate images when they are pushed to a repository, allowing you to
45- track compliance, get notified of deviations, and integrate policy checks into
46- your CI/CD pipeline.
45+ When you enable Docker Scout for your repositories, you can configure the
46+ [ ** Valid Docker Hardened Image (DHI) or DHI base
47+ image** ] ( ../../scout/policy/_index.md#valid-docker-hardened-image-dhi-or-dhi-base-image )
48+ policy. This optional policy validates whether your images are DHIs or built with DHI
49+ base images by checking for Docker signed verification summary attestations.
4750
48- ### Example: Create a policy for DHI-based images
51+ The following example shows how to build an image using a DHI base image and
52+ evaluate its compliance with the DHI policy.
4953
50- This example shows how to create a policy that requires all images in your
51- organization to use Docker Hardened Images as their base. This ensures that
52- your applications are built on secure, minimal, and production-ready images.
54+ ### Example: Build and evaluate a DHI-based image
5355
5456#### Step 1: Use a DHI base image in your Dockerfile
5557
@@ -85,26 +87,30 @@ $ docker scout enroll YOUR_ORG
8587$ docker scout repo enable --org YOUR_ORG YOUR_ORG/my-dhi-app
8688```
8789
88- #### Step 4: Create a policy
90+ #### Step 4: Configure the DHI policy
91+
92+ Once Docker Scout is enabled, you can configure the ** Valid Docker Hardened
93+ Image (DHI) or DHI base image** policy for your organization:
8994
90951 . Go to the [ Docker Scout dashboard] ( https://scout.docker.com ) .
91962 . Select your organization and navigate to ** Policies** .
92- 3 . Select ** Add policy** .
93- 4 . Select ** Configure** for ** Approved Base Images Policy** .
94- 5 . Give the policy a compliant name, such as ** Approved DHI Base Images** .
95- 6 . In ** Approved base image sources** , delete the default item.
96- 7 . In ** Approved base image sources** , add approved base image sources. For this
97- example, use the wildcard (` * ` ) to allow all mirrored DHI repositories,
98- ` docker.io/ORG_NAME/dhi-* ` . Replace ` ORG_NAME ` with your organization name.
99- 8 . Select ** Save policy** .
97+ 3 . Configure the ** Valid Docker Hardened Image (DHI) or DHI base image** policy
98+ to enable it for your repositories.
99+
100+ For more information on configuring policies, see
101+ [ Configure policies] ( ../../scout/policy/configure.md ) .
102+
103+ #### Step 5: View policy compliance
100104
101- #### Step 5: Evaluate policy compliance
105+ Once the DHI policy is configured and active, you can view compliance results:
102106
1031071 . Go to the [ Docker Scout dashboard] ( https://scout.docker.com ) .
1041082 . Select your organization and navigate to ** Images** .
1051093 . Find your image, ` YOUR_ORG/my-dhi-app:v1 ` , and select the link in the ** Compliance** column.
106110
107- This shows the policy compliance results for your image, including whether it
108- meets the requirements of the ** Approved DHI Base Images** policy.
111+ This shows the policy compliance results for your image. The ** Valid Docker
112+ Hardened Image (DHI) or DHI base image** policy evaluates whether your image has
113+ a valid Docker signed verification summary attestation or if its base image has
114+ such an attestation.
109115
110116You can now [ evaluate policy compliance in your CI] ( /scout/policy/ci/ ) .
0 commit comments