Skip to content

Security Documentation Directory Contents

Directory Purpose

This directory contains comprehensive documentation about security aspects of the Secure CINC Auditor Kubernetes Container Scanning platform.

Overview Files

File Description
index.md Overview of security documentation
inventory.md Directory listing of all security documentation

Security Subdirectories

Directory Description
principles/ Core security principles documentation
risk/ Security risk analysis documentation
compliance/ Compliance frameworks alignment documentation
threat-model/ Threat modeling and mitigation documentation
recommendations/ Security best practices and recommendations

Security Principles Section

The principles/ directory contains:

File Description
index.md Overview of security principles
least-privilege.md Details on least privilege implementation
ephemeral-creds.md Details on ephemeral credentials
resource-isolation.md Details on resource isolation
secure-transport.md Details on secure transport
inventory.md Directory listing

Risk Analysis Section

The risk/ directory contains:

File Description
index.md Overview of risk analysis
model.md Risk model and methodology
kubernetes-api.md Risks for Kubernetes API approach
debug-container.md Risks for Debug Container approach
sidecar-container.md Risks for Sidecar Container approach
mitigations.md Risk mitigation strategies
inventory.md Directory listing

Compliance Section

The compliance/ directory contains:

File Description
index.md Overview of compliance documentation
dod-8500-01.md DoD Instruction 8500.01 alignment
disa-srg.md DISA Container Platform SRG alignment
kubernetes-stig.md Kubernetes STIG alignment
cis-benchmarks.md CIS Kubernetes Benchmarks alignment
approach-comparison.md Compliance comparison of approaches
risk-documentation.md Requirements for risk documentation
inventory.md Directory listing

Threat Model Section

The threat-model/ directory contains:

File Description
index.md Overview of threat modeling
attack-vectors.md Potential attack vectors
threat-mitigations.md Threat mitigation strategies
token-exposure.md Token exposure threats and mitigations
lateral-movement.md Preventing lateral movement
inventory.md Directory listing

Recommendations Section

The recommendations/ directory contains:

File Description
index.md Overview of security recommendations
enterprise.md Enterprise security recommendations
ci-cd.md CI/CD security recommendations
monitoring.md Security monitoring recommendations
network.md Network security recommendations
inventory.md Directory listing