You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Application and system components like Open Source libraies or images can have implementation flaws or deployment flaws.
272
+
- Developers or operations might start random images in the production cluster
273
+
which have malicious code or known vulnerabilities.
274
+
measure:
275
+
- Each components source is evaluated to be trusted. For example the source, number of developers included, email configuration used by maintainers to prevent maintainer account theft, typo-squatting, ...
276
+
- Create image assessment criteria, perform an evaluation of images and create a whitelist of artifacts/container images/virtual machine images.
0 commit comments