-
# Data Privacy Risk Assessment for Elementary School
## 1. Executive Summary
The purpose of this assessment is to identify, evaluate, and mitigate potential data privacy risks in an elementary sch…
-
As a CSP, I want to continuously scan my container infrastructure for security weaknesses so that I can prevent security gaps in my Kubernetes clusters.
This issue focusses on the **Trivy Operator*…
-
Currently the live stream could be expanded to offer more features.
Have a list of suggestions based on current use.
- New live stream option, 'Pause Stream When The Current Print Completes'. Curr…
ados8 updated
3 weeks ago
-
_This issue was automatically created by [Allstar](https://github.com/ossf/allstar/)._
**Security Policy Violation**
Security policy not enabled.
A SECURITY.md file can give users information about w…
-
If you were to enable the `BulletTrain::OutgoingWebhooks.advanced_hostname_security` (not enabled on prod atm), there is potential to hit an infinite loop of sorts.
Suppose that you attempt to call…
-
### Describe the enhancement requested
"Trusted publishing" may help improve the security of wheel uploads, and also provide automated digital attestations.
See https://discuss.python.org/t/pypi-now…
-
### Summary
[AWS Security Hub](https://aws.amazon.com/security-hub/) provides continuous monitoring for NIST security controls.
This has been added to our account. This ticket is to export the s…
-
## Summary of Bug
By adding oss-fuzz continuous fuzzing, that'll allow fuzzing to be performed day and night and report security bugs instead of trying to run it locally on laptops.
This iss…
-
Key Points for Summary:
- Cloud-Native Security: Cloud-native applications bring new security challenges like securing microservices, containers, and API communications.
- Zero-Trust Architec…
-
**Motivation**
As a software development team member, I want to establish automated code quality checks in our CI/CD pipeline, so that we can ensure our codebase adheres to best practices, maintains …