Security Configuration¶
Directory Inventory
See the Security Directory Inventory for a complete listing of files and resources in this directory.
This section provides documentation for security-focused configurations of the CINC Auditor container scanning solution.
Security Configuration Overview¶
Security configurations ensure that the scanner operates in a secure manner and maintains appropriate access controls. Key security considerations include:
- Credential Management: Secure handling of kubeconfig files and tokens
- RBAC Hardening: Configuring least-privilege role-based access
- Network Security: Securing network communications between components
Security Configuration Guides¶
- Hardening Configuration - Security hardening recommendations
- Credential Management - Secure management of authentication credentials
- RBAC Configuration - Role-based access control for scanners
Common Use Cases¶
Use Case | Guide | Description |
---|---|---|
Production Deployment | Hardening | Secure configuration for production environments |
Sensitive Environments | Credentials | Managing credentials in high-security environments |
Multi-tenant Clusters | RBAC | Isolating scanner access between tenants |
Getting Started¶
Most users should begin with the Hardening Configuration to understand the basic security recommendations, followed by the specific guides relevant to their deployment scenario.