-
PNS
Medium
# An incorrectly identified author will not be able to archive or restore reviews
### Summary
Archiving and restoring reviews is wrongly authorized by msg.sender instead of by profile i…
-
Although it is very straight forward to call action "Unknown/Allowed/Denied/Other" and i agree with it, the field action is already present in another Models (CIM) used by Splunk, and I think it may b…
-
## Cilium Feature Proposal
`cilium-connectivity test` is spinning up some pods to tests all sorts of egress/ingress communication paths within the cluster. But having a `gateKeeper` in place, pods no…
-
### Description
From @stianst in this discussion point https://github.com/keycloak/keycloak/discussions/27171#discussioncomment-8540009 :
I'd suggest we'd add something to `Profile` to make it e…
-
# Description
The Fortian security review recommended that detached signatures be included in the information security profile to provide recipient certainty of the data provided. The DSB agreed to …
-
As can be read in ``4.2 Profile 2: Security incident response``:
> This profile SHOULD be used to provide a response to a security breach or incident. **This MAY also be used to convey information …
-
When Kubernetes Pod Security Standards implemented as Kyverno policies on k8s cluster, rbac-manager shows policy failed in PolicyReport as following
- category: Pod Security Standards (Restricted)
…
-
**Is your enhancement proposal related to a problem? Please describe.**
https://docs.zephyrproject.org/latest/security/hardening-tool.html is designed with security in mind, however it can be used …
-
Tried to use an RG scope for an attachment.
I set the `resource_groups_scope` with one resource group name in the array. This was done after the SCC instance with a profile attachment for "AI Securit…
-
@ilyavf what are the security requirements for the `/companies` endpoint? Which users should be able to access/create/remove records, etc.?