Skip to content

Security Configuration

Directory Inventory

See the Security Directory Inventory for a complete listing of files and resources in this directory.

This section provides documentation for security-focused configurations of the CINC Auditor container scanning solution.

Security Configuration Overview

Security configurations ensure that the scanner operates in a secure manner and maintains appropriate access controls. Key security considerations include:

  1. Credential Management: Secure handling of kubeconfig files and tokens
  2. RBAC Hardening: Configuring least-privilege role-based access
  3. Network Security: Securing network communications between components

Security Configuration Guides

Common Use Cases

Use Case Guide Description
Production Deployment Hardening Secure configuration for production environments
Sensitive Environments Credentials Managing credentials in high-security environments
Multi-tenant Clusters RBAC Isolating scanner access between tenants

Getting Started

Most users should begin with the Hardening Configuration to understand the basic security recommendations, followed by the specific guides relevant to their deployment scenario.