-
**Motivation**: Given that [Zero Trust architectures](https://www.nist.gov/publications/zero-trust-architecture) are becoming mandated by nation-states, most, if not all, Zero Trust architecture use c…
-
### What would you like to be added?
It would be nice to have the option to pass along custom headers from kubectl to the k8s api. This would allow for more security options to be used, possibly tr…
-
Resources to explore the two challenges listed in #2:
1. NO "proof of manufacturing" according to a known open source chip design specification
2. NO proof that whatever secrets were encoded into …
-
### Description
[This existing page](https://www.elastic.co/guide/en/security/current/add-exceptions.html) documents the rules for escaping `\`, `*`, and `?` for rule exceptions with this text
> Som…
-
### Check for existing issues
- [X] Completed
### Describe the feature
Zed does not use OS-level CA certificate bundles, which causes it to fail to make any network call when installed in many corp…
-
### ⚠️ Please verify that this question has NOT been raised before.
- [X] I checked and didn't find similar issue
### 🛡️ Security Policy
- [X] I agree to have read this project [Security Poli…
-
## Add security principles and posture of canvas reference implementation
For the Canvas reference implementation (and, by implication for the eventual standards) we should document the principles …
-
Please use this issue to brainstorm outcomes you would like to be able to achieve with IPSIE. We will collect and discuss these on the next working group call.
What outcomes are important to you an…
-
## Summary
Ensure that all aspects of the cluster are covered with a stable and reliable solution
## TODO
- Storage
- [x] Rook ceph
- Networking
- [x] Cilium
- [x] External D…
-