You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: keps/sig-security/1933-secret-logging-static-analysis/README.md
+3-6Lines changed: 3 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -173,7 +173,6 @@ It can be use used to harden the boundaries for those data which require special
173
173
174
174
This Kubernetes Enhancement Proposal (KEP) proposes such analysis to be used
175
175
during testing to prevent various types of sensitive information from leaking via logs.
176
-
For a complimentary efforts at runtime, see [KEP-1753: Kubernetes system components logs sanitization](https://github.com/kubernetes/enhancements/pull/1754).
177
176
178
177
## Motivation
179
178
@@ -251,8 +250,8 @@ Taint propagation analysis gives additional consideration is given to how data
251
250
See the `go-flow-levee` documentation for details.
252
251
253
252
While configuration of source identification can be done via manually configured regexp,
254
-
this KEP would benefit from a set of standard Kubernetes go lang struct tags indicating which fields are expected to contain secrets,
255
-
as proposed in [KEP-1753](https://github.com/kubernetes/enhancements/pull/1754).
253
+
this KEP benefits from a set of standard Kubernetes go lang struct tags indicating which fields are expected to contain secrets.
254
+
See [KEP-1753](/keps/sig-instrumentation/1753-logs-sanitization/README.md) for more information on data policy tags.
256
255
257
256
### Notes/Constraints/Caveats
258
257
@@ -576,9 +575,7 @@ However, such additional testing has not proven necessary given the rarity of bo
576
575
As this analysis depends on project-specific considerations of what constitutes
577
576
a secret or a sink, periodic review is required to ensure configuration is kept up-to-date.
578
577
This is mitigated somewhat with a consistent use of field tags,
579
-
as proposed in [KEP-1753](https://github.com/kubernetes/enhancements/pull/1754),
580
-
though correct application of field tags would also be subject to periodic review.
581
-
578
+
as introduced in [KEP-1753](/keps/sig-instrumentation/1753-logs-sanitization/README.md).
0 commit comments