76 SWEG / SEI - Next Steps
Abstract:
Research has confirmed that attackers generally dont exploit the software base (container). Most attacks are against vulnerabilities created by the configuration of the deployment. Pipeline administrators are faced with many complex and interdependent configuration choices that are critical to maintaining the security expected from hardened containers.
Security Markings
DOCUMENT & CONTEXTUAL SUMMARY
Distribution Code:
A - Approved For Public Release
Distribution Statement: Public Release
RECORD
Collection: TRECMS