adjust poplating email of person for events #4394
Annotations
10 warnings
charts/dbildungs-iam-server/templates/redis-deployment.yaml#L22
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
|
charts/dbildungs-iam-server/templates/backend-deployment.yaml#L23
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
charts/dbildungs-iam-server/templates/redis-deployment.yaml#L34
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
charts/dbildungs-iam-server/templates/backend-deployment.yaml#L78
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
charts/dbildungs-iam-server/templates/backend-deployment.yaml#L23
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
charts/dbildungs-iam-server/templates/redis-deployment.yaml#L38
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
charts/dbildungs-iam-server/templates/backend-deployment.yaml#L23
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
charts/dbildungs-iam-server/templates/redis-deployment.yaml#L22
Containers should drop 'ALL' or at least 'NET_RAW' capabilities
|
charts/dbildungs-iam-server/templates/redis-deployment.yaml#L38
Containers should be configured with a secure Seccomp profile to restrict potentially dangerous syscalls
|
charts/dbildungs-iam-server/templates/redis-deployment.yaml#L20
Service Account Tokens are automatically mounted even if not necessary
|
This job succeeded
Loading