[ICN-361] Test Randy's remediations for kubehunter Created: 13/May/20 Updated: 24/Jul/20 Resolved: 27/May/20 |
|
| Status: | Done |
| Project: | Integrated Cloud Native NFV |
| Component/s: | None |
| Affects Version/s: | None |
| Fix Version/s: | None |
| Type: | Story | Priority: | Medium |
| Reporter: | Igor Duarte Cardoso | Assignee: | Igor Duarte Cardoso |
| Resolution: | Done | Votes: | 0 |
| Labels: | None | ||
| Remaining Estimate: | Not Specified | ||
| Time Spent: | Not Specified | ||
| Original Estimate: | Not Specified | ||
| Epic Link: | ICN Bluval compliance |
| Sprint: | ICN Sprint 18 |
| Story Points: | 1 |
| Description |
|
Randy from SSC has recommended checking https://wiki.akraino.org/display/AK/Steps+To+Implement+Security+Scan+Requirements for kubehunter vulnerability remediations. I see 3 potential fixes there. Will follow those remediations and report back ASAP. |
| Comments |
| Comment by Igor Duarte Cardoso [ 29/May/20 ] |
|
FYI, the remediations successfully brought the number of vulnerabilities to only 1: the CAP_NET_RAW exposure. |
| Comment by Igor Duarte Cardoso [ 20/May/20 ] |
|
Repurposing story. |