Open edoardogiordano opened 3 months ago
- Environmental:
I mostly agree with this. Although are usually exposed inside logs
can you provide an example of this statement.
In theory it is also possible to rotate Environment Variables.
- Volumes:
and perform a better access control.
based on DAC (uid and gid) or protect with additional MAC methods such as SELinuxThe files need to have a proper access control definition, to prevent the unauthorized access of a different process
or using different mount namespaces to prevend unauthorizted processes from accessing the file.
- UNIX Domain Socket/Loopback interface/Magic (Link-Local) Address (e.g., AWS Metadata Service 169.254.169.254)
UNIX Domain Socket
: I think we should mention this as well as
lo and Link-Local
addresses
@edoardogiordano wdyt?
Following the discussion on the mailing list, I wanted to give my take on the different options to provision the workload with the token. Maybe we can use it to start the discussion before starting the PR.
Identity provision mechanisms: Current workload systems mainly rely on three solution to provide the Identity to a running workload: