View Docker Scout policy status
Early Access
Policy Evaluation is an Early Access feature of Docker Scout.
You can track policy status for your artifacts from the Docker Scout Dashboard, or using the CLI.
Dashboard
The Overview tab of the Docker Scout Dashboardopen_in_new displays a summary of recent changes in policy for your repositories. This summary shows images that have seen the most change in their policy evaluation between the most recent image and the previous image.


Policy status per repository
The Images tab shows the current policy status, and recent policy trend, for all images in the selected environment. The Policy status column in the list shows:
- Number of fulfilled policies versus the total number of policies
- Recent policy trends


The policy trend, denoted by the directional arrows, indicates whether an image is better, worse, or unchanged in terms of policy, compared to the previous image in the same environment.
- The green arrow pointing upwards shows the number of policies that got better in the latest pushed image.
- The red arrow pointing downwards shows the number of policies that got worse in the latest pushed image.
- The bidirectional gray arrow shows the number of policies that were unchanged in the latest version of this image.
If you select a repository, you can open the Policy tab for a detailed description of the policy delta for the most recently analyzed image and its predecessor.
Detailed results and remediation
To view the full evaluation results for an image, navigate to the image tag in the Docker Scout Dashboard and open the Policy tab. This shows a breakdown for all policy violations for the current image.


This view also provides recommendations on how to improve improve policy status for violated policies.


For vulnerability-related policies, the policy details view displays the fix version that removes the vulnerability, when a fix version is available. To fix the issue, upgrade the package version to the fix version.
For licensing-related policies, the list shows all packages whose license doesn't meet the policy criteria. To fix the issue, find a way to remove the dependency to the violating package, for example by looking for an alternative package distributed under a more appropriate license.
CLI
To view policy status for an image from the CLI, use the docker scout policy
command.
$ docker scout policy \
--org dockerscoutpolicy \
--platform linux/amd64 \
dockerscoutpolicy/email-api-service:0.0.2
Image reference: dockerscoutpolicy/email-api-service:0.0.2
Digest: sha256:17b1fde0329c71af302b6391fc73a08f56cb8c33e7eea7a33b61a24cedbf2b69
Platform: linux/amd64
## Overview
Policy status: FAILED (1/3 policies violated)
Policy │ Results
─────────────────────────────────────────────────┼────────────────────
✓ Critical and high vulnerabilities with fixes │ 0 vulnerabilities
✗ Critical vulnerabilities │ 1C
✓ Packages with GPL3+ licenses │ 0 packages
## "Critical vulnerabilities" policy evaluation results
Vulnerability │ Severity │ Current package version │ Fix version
─────────────────┼────────────┼─────────────────────────────────────────────────────────────────┼──────────────
CVE-2022-48174 │ CRITICAL │ pkg:apk/alpine/busybox@1.36.1-r0?os_name=alpine&os_version=3.18 │ 1.36.1-r1
For more information about the command, refer to the CLI reference.