The DevOps HandbookSecurity & Risk Management group) 1. Authentication/authorization decisions 2. System and data access 3. System and application changes, especially privileged changes 4. Data changes (CRUD) 5. Invalid CREATE SELF-SERVICE ACCESS TO TELEMETRY AND INFORMATION RADIATORS i. Spread the information – anyone who wants or needs the information can readily access it without production access or other privileged0 码力 | 8 页 | 24.02 KB | 5 月前3
DevOps MeetupRoute Adds – requires heightened security access Database Data Script Execution Load Balancer Node Disablement OS and Security Patching Requesting access to technology specific dashboards and consoles0 码力 | 2 页 | 246.04 KB | 5 月前3
postgresql操作手册List of databases Name | Owner | Encoding | Collate | Ctype | Access privileges -----------+----------+----------+-------------+-------------+----------------------- List of databases Name | Owner | Encoding | Collate | Ctype | Access privileges -----------+----------+----------+-------------+-------------+-----------------------0 码力 | 17 页 | 445.84 KB | 1 年前3
DoD CIO Enterprise DevSecOps Reference Design - Summarycontainer security, east/west traffic management, a zero-trust model, a whitelist, Role-Based Access Control (RBAC), continuous monitoring, signature-based continuous scanning using Common Vulnerabilities0 码力 | 8 页 | 3.38 MB | 5 月前3
k8s操作手册 2.3此 Secret 资 源 为 docker-registry 类 型 的 imagePullSecret EOF ③RBAC基于角色的访问控制 RBAC(Role-Based Access Control)基于角色的访问控制,它将权限授予角色 Role之上,然后将角色绑定到某用户或用户组上,这样用户就有了所绑定角色 的权限 k8s的RBAC的角色有2种, Role role作用于名称空间,有命名空间之分0 码力 | 126 页 | 4.33 MB | 1 年前3
共 5 条
- 1













