intel-device-plugins-for-ku.../.trivyignore
Mikko Ylinen 7f685b5d89 sgx: add QuoteVerification demo and cleanup hostNetwork dependency
hostNetwork usage for SGX demo pods is not absolutely necessary so it's
better to clean it up and make IAS "security" scanners happier. It was
originally used to be able to use "localhost" PCCS but this change now
adds an example how proper PCCS url can be configured using jq.

Additionally, SGX DCAP Quote Verification is added.

Signed-off-by: Mikko Ylinen <mikko.ylinen@intel.com>
2023-08-31 14:23:19 +03:00

28 lines
1.1 KiB
Plaintext
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Image user should not be root
# Running containers with root user can lead to a container escape situation.
# It is a best practice to run containers as non-root users, which can be done by
# adding # a USER statement to the Dockerfile.
AVD-DS-0002
# Privileged containers share namespaces with the host system and do not offer any security.
# They should be used exclusively for system containers that require high # privileges.
# initcontainers require privileged access
AVD-KSV-0017
# Do not allow privilege escalation from node proxy
# Check whether role permits privilege escalation from node proxy
# gpu plugin in kubelet mode requires "nodes/proxy" resource access
AVD-KSV-0047
# Do not allow update/create of a malicious pod
# Check whether role permits update/create of a malicious pod
# device plugin operator requires access to daemonset creation etc.
AVD-KSV-0048
# HostPath present many security risks and as a security practice it is better to avoid critical host paths mounts.
# Some plugins require access to various host paths
AVD-KSV-0121
# Device plugins do not use any CSIs
## CVE-2019-11255