Skip to content

Commit 2015363

Browse files
committed
minor
1 parent 9763946 commit 2015363

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

content/14-advanced-pipeline/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,15 +83,15 @@ So there is a major security vulnerability in our code. ACS would detect the dep
8383

8484
So first of all in the **ACS Portal** follow these steps:
8585

86-
- Navigate to **Platform Configuration > System Policies**
86+
- Navigate to **Platform Configuration > Policies**
8787
- Search for `Log4Shell` and click on the Policy.
8888
- Click **Edit** at the upper right
8989

9090
Remember setting up image scanning with `roxctl` in our first pipeline? We use `roxctl` in a way that it only scans against Policies from a certain category, `Workshop` in our case. To have the task scan for the Log4Shell Policy, first add the Policy to the category `Workshop`:
9191

9292
- Remove the current categorie and add `Workshop`
9393
- Now hit next until you are at the enforcement tab
94-
- Enable both `Build` and `Deploy` enforcement by setting them to **On**
94+
- Enable both `Build` and `Deploy` enforcement by switching to **Inform and enforce** and setting them to **On**
9595
- Save the policy
9696

9797
ACS is now able to detect and enforce the vulnerability. It is time now to implement your advanced Pipeline.

0 commit comments

Comments
 (0)