-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
security-vulnerabilities: add more info about base images #11236
Conversation
|
||
Istio offers two sets of docker images, based on `ubuntu` (default) and based on `distroless` (see [Harden Docker Container Images](docs/ops/configuration/security/harden-docker-images/)). | ||
These base images occasionally have CVEs. | ||
The Istio security team has automated scanning to ensure base images are kept free of CVEs. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
product security?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
rest of page uses "Istio security team". Want me to change them all?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nope. Sounds like that's been the norm, and I had missed that.
|
||
## Base Images | ||
|
||
Istio offers two sets of docker images, based on `ubuntu` (default) and based on `distroless` (see [Harden Docker Container Images](docs/ops/configuration/security/harden-docker-images/)). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Istio offers two sets of docker images, based on `ubuntu` (default) and based on `distroless` (see [Harden Docker Container Images](docs/ops/configuration/security/harden-docker-images/)). | |
Istio offers two sets of docker images, one based on `Ubuntu` (default) and another based on `distroless` (see [Harden Docker Container Images](docs/ops/configuration/security/harden-docker-images/)). |
The Istio security team has automated scanning to ensure base images are kept free of CVEs. | ||
|
||
When CVEs are detected in our images, new images are automatically built and used for all future builds. | ||
Additionally, the security team analyzes the vulnerabilities to see if they are exploitable in Istio directly. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
product security
db5c53e
to
f539272
Compare
/retest |
/cherry-pick release-1.13 |
@ericvn: new pull request created: #11242 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Please provide a description for what this PR is for.
And to help us figure out who should review this PR, please
put an X in all the areas that this PR affects.