Skip to content
This repository has been archived by the owner on Jan 22, 2024. It is now read-only.

Commit

Permalink
doc updates to main README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
simonsdave committed Jun 20, 2018
1 parent fc4f78f commit 0e455b0
Showing 1 changed file with 14 additions and 8 deletions.
22 changes: 14 additions & 8 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@
[![docker-simonsdave/clair-cicd-tools](https://img.shields.io/badge/docker-simonsdave%2Fclair%20cicd%20tools-blue.svg)](https://hub.docker.com/r/simonsdave/clair-cicd-tools/)

```
Repo Status = this repo is a WIP but starting to see real progress
Repo Status = this repo is a WIP but starting to show some promise!
```

[Clair](https://github.com/coreos/clair),
Expand All @@ -21,7 +21,7 @@ Integrating Clair into a CI/CD pipeline:

1. can be complex (believe this is mostly a documentation challenge)
1. can create performance problems (building the Postgres vulnerabilities database is slow)
1. in and of itself is insufficient from a risk assessment POV because once vulnerabilities
1. in and of itself is insufficient from a risk assessment point of view because once vulnerabilities
are identified there's a lack of prescriptive guidance on how to act on
the identified vulnerabilities

Expand All @@ -46,20 +46,26 @@ vulnerabilities when inserted into the CI/CD pipeline
* the CI/CD pipeline has to be fast. how fast? ideally < 5 minutes
between code commit and automated (CD) deployment begins rolling
out a change
* there should be a clear division of responsibilities between
those who create a docker image and those that determine the
risk of vulnerabilities in a docker image
* the risk assessment process must generate evidence which
can be used to understand the risk assessment decision

## Key Participants

* service engineer - responsible for implementing a service that packaged
in a docker container
* security analyst - responsible for defining the

## Key Concepts

* vulnerabilities
* docker image
* vulnerabilities
* static vulnerability analysis
* vulnerability whitelist
* service profile

## Key Participants

* service engineer
* security analyst

## How to Use

### Getting Started
Expand Down

0 comments on commit 0e455b0

Please sign in to comment.