Skip to main content
Version: v0.28.6

Scoring & Metrics

regis doesn't just provide raw data; it translates analysis results into actionable Scores and Metrics based on your security and operational policies. Scores are derived from rules and displayed in reports.

How Scores are Calculated

Scores are determined by the Playbooks you apply. A playbook defines rules, and each rule can contribute to a specific score category.

Major Score Categories

  • Security Posture: Derived from Trivy (CVEs), Hadolint (Dockerfile security), and Provenance checks.
  • Freshness: Measures how recently the image was built and how far it has drifted from its base image.
  • Compliance: Tracks adherence to internal standards (e.g., mandatory labels, allowed registries).
  • Efficiency: Analyzes image size, layer count, and potential optimizations.

Rule Weights

In a playbook, rules can be assigned different severities (e.g., CRITICAL, HIGH, LOW). These severities directly impact the final score:

  • Critical violations often result in a "Fail" state for CI/CD pipelines.
  • Informational rules provide insights without affecting the main status code.

Interpreting Results

The final report provides a visual summary of these scores, allowing engineers to quickly identify if an image is "Production Ready."

note

Scores are subjective to the playbook used. An image might "Pass" a development playbook but "Fail" a strict production-hardening playbook.