76 SWEG / SEI - Next Steps

reportActive / Technical Report | Accesssion Number: AD1137192 | Open PDF

Abstract:

Research has confirmed that attackers generally dont exploit the software base (container). Most attacks are against vulnerabilities created by the configuration of the deployment. Pipeline administrators are faced with many complex and interdependent configuration choices that are critical to maintaining the security expected from hardened containers.

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution Code:
A - Approved For Public Release
Distribution Statement: Public Release

RECORD

Collection: TRECMS
Identifying Numbers
Subject Terms