diff --git a/Dockerfile b/Dockerfile index 58f4768e1c1e..f5432d03461a 100644 --- a/Dockerfile +++ b/Dockerfile @@ -1,11 +1,11 @@ -# syntax=docker/dockerfile-upstream:master +# syntax=docker/dockerfile:1 # check=skip=InvalidBaseImagePlatform # ALPINE_VERSION sets the Alpine Linux version for all Alpine stages ARG ALPINE_VERSION=3.20 # GO_VERSION sets the Go version for the base stage ARG GO_VERSION=1.23 -# HTML_TEST_VERSION sets the wjdp/htmltest version for HTML testing +# HTMLTEST_VERSION sets the wjdp/htmltest version for HTML testing ARG HTMLTEST_VERSION=0.17.0 # base is the base stage with build dependencies diff --git a/content/guides/docker-scout/_index.md b/content/guides/docker-scout/_index.md index 80edf231ab59..8fd53d1d5c26 100644 --- a/content/guides/docker-scout/_index.md +++ b/content/guides/docker-scout/_index.md @@ -29,24 +29,23 @@ params: When container images are insecure, significant risks can arise. Around 60% of organizations have reported experiencing at least one security breach or -vulnerability incident within a year, resulting in operational -disruption.[^CSA] These incidents often result in considerable downtime, with +vulnerability incident within a year, [resulting in operational +disruption][CSA]. These incidents often result in considerable downtime, with 44% of affected companies experiencing over an hour of downtime per event. The -financial impact is substantial, with the average data breach cost reaching -$4.45 million.[^IBM] This highlights the critical importance of maintaining +financial impact is substantial, with [the average data breach cost reaching +$4.45 million][IBM]. This highlights the critical importance of maintaining robust container security measures. Docker Scout enhances container security by providing automated vulnerability detection and remediation, addressing insecure container images, and ensuring compliance with security standards. -[^CSA]: https://cloudsecurityalliance.org/blog/2023/09/21/2023-global-cloud-threat-report-cloud-attacks-are-lightning-fast - -[^IBM]: https://www.ibm.com/reports/data-breach +[CSA]: https://cloudsecurityalliance.org/blog/2023/09/21/2023-global-cloud-threat-report-cloud-attacks-are-lightning-fast +[IBM]: https://www.ibm.com/reports/data-breach ## What you'll learn -- Define secure software supply chain (SSSC) +- Define Secure Software Supply Chain (SSSC) - Review SBOMs and how to use them - Detect and monitor vulnerabilities