-
One mild concern/criticism I heard about composefs is that in theory a process can just bypass the upper mount and read the underlying object files directly. I think in a "pure composefs" model they s…
-
To enhance security, restrict network access to trusted IPs or networks only. This reduces the risk of unauthorized access and protects sensitive data by limiting interactions to specific, authorized …
fbrv updated
2 months ago
-
-
### Description
The [ProducerController](https://github.com/eiffel-community/eiffel-remrem-publish/blob/fe2e46783444fe4674a0a01a8a585c738f31a0ec/publish-service/src/main/java/com/ericsson/eiffel/remr…
-
### Summary
eg. scoping down this policy, without breaking opensearch
https://github.com/HHS/simpler-grants-gov/pull/2452/files#diff-b5ef403a679056e13d89fb4d322e947a82edfd50d1e6f0b330e1fbfce3230394
…
-
### Summary
Currently, there is no way to restrict access grants via the UI for object lock related permissions. We want to enable this ability. The new permissions (restrictions) are:
- PutObject…
-
Pages are still accessible even when user is not logged in.
**Description:** Currently, the application handles authentication, but there is an issue where users can still access protected pages …
-
How do I restrict the router to open only a small list of websites? Or do a blacklist of forbiden websites...
-
### Problem Statement
Customer is concerned about PII in Session Replays and wants to restrict access to certain users from viewing the Session Replays.
### Solution Brainstorm
Option to restrict a…
-
E.g. currently in staging there are two versions of `A71EV2A`, and one under `lb32627-66` and the other under `lb32627-71`.
I uploaded a RHS dataset to `lb32627-66` but it also shows up under `lb3…