You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> and launch an internal-only GitLab instance accessible
> only to Protected B workloads.
>
> 2. Launch a GitLab instance in the AAW environment which is
> available to all workloads. Workloads running at the
> Protected B level are granted only HEAD / GET requests
> to the GitLab instance (to prevent data exfiltration).
> POST requests to specificly authorized endpoints,
> such as for authorization, will be allowed.
>
> 3. Two seperate GitLab instances be launched in the AAW
> environment, 1 for unclassified and 1 for Protected B.
> This is the least recommended solution due to the
> maintenance overhead.
>
> **DAaaS should identify the best solution based on the
> needs of its users, and therefore this proposal
> does not specify a specific solution.**
Add the new reocmmendations for an architecture around per-namespace Gitea, highlighting the simplicity for multi-tenancy and authentication, and enablement of MLOps.
Consider studying a mechanism for providing a read-only mirror of the unclassified gitea for use in protected-b notebooks, perhaps using this:
Revise the following guidance
aaw-security-proposal/05-network.md
Lines 88 to 129 in 429d3d7
Add the new reocmmendations for an architecture around per-namespace Gitea, highlighting the simplicity for multi-tenancy and authentication, and enablement of MLOps.
Consider studying a mechanism for providing a read-only mirror of the unclassified gitea for use in protected-b notebooks, perhaps using this:
https://docs.gitea.io/en-us/repo-mirror/#pulling-from-a-remote-repository
The text was updated successfully, but these errors were encountered: