You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
Many data protection and critical infrastructures regulations ask for vulnerability management to be taken seriously. We are doing a lot when it comes to vulnerability management, however, this is hidden in internal docs. Let's make them public to gain exposure.
Describe the solution you'd like
Something along the lines of:
Elastisys makes commercially reasonable efforts to ensure that Compliant Kubernetes and Additional Services are free from security vulnerabilities which are either publicly known or known to Elastisys, inter alia:
Prepare:
control what software components are added to software used by Elastisys (link to ADR page);
ensure software components are provisioned from vendors which have demonstrated good vulnerability management;
ensure the Software Bill of Materials (SBOM) is up-to-date;
subscribe to security announcements issued by vendors of software components used by Elastisys (link to security-lists);
ensure via its CNCF membership that open-source projects are sufficiently funded for good vulnerability management;
Detect:
regularly review the output of container scanning tools, such as Trivy; however, they are super-noisy, so we don't aim for "zero vulnerability" to avoid malicious compliance;
monitor security announcements issued by vendors of software components used by Elastisys;
Is your feature request related to a problem? Please describe.
Many data protection and critical infrastructures regulations ask for vulnerability management to be taken seriously. We are doing a lot when it comes to vulnerability management, however, this is hidden in internal docs. Let's make them public to gain exposure.
Describe the solution you'd like
Something along the lines of:
Elastisys makes commercially reasonable efforts to ensure that Compliant Kubernetes and Additional Services are free from security vulnerabilities which are either publicly known or known to Elastisys, inter alia:
Additional context
The text was updated successfully, but these errors were encountered: