Skip to content

Commit 1beecb0

Browse files
authored
[Doc-17096] add the security model reqeust of Network Environment (#17097)
* Update security-model.md * Update security-model.md
1 parent 46485a4 commit 1beecb0

2 files changed

Lines changed: 8 additions & 0 deletions

File tree

docs/docs/en/contribute/join/security-model.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,10 @@ Apache DolphinScheduler supports four authentication methods: login with your ow
6969

7070
Administrator users can configure resources such as queues, tenants, users, alarm groups, worker groups, tokens, k8s clusters, k8s namespaces, etc. It is necessary to trust that the user's permission allocation, use, and maintenance of resources will not affect the platform and service itself.
7171

72+
## Network Environment
73+
74+
Apache DolphinScheduler's deployment and usage are based on the assumption that the user's network is secure and trustworthy. Apache DolphinScheduler does not address internal network cross-infiltration issues.
75+
7276
### Examples of Mistaken Security Vulnerabilities
7377

7478
The following are some erroneous vulnerabilities raised by users and developers in the past.

docs/docs/zh/contribute/join/security-model.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,10 @@ Apache DolphinScheduler支持四种认证方式,自身账号密码登录,LDA
6767

6868
管理员用户可以配置队列、租户、用户、告警组、worker分组、令牌、k8s集群、k8s命名空间等资源,需要信用用户对资源的权限分配、使用、维护,都不会对平台和服务本身产生影响。
6969

70+
## 网络环境
71+
72+
Apache DolphinScheduler的部署和使用认为用户网络是安全和值得信任的,Apache DolphinScheduler不处理内网交叉渗透问题
73+
7074
### 误认为是安全漏洞的示例
7175

7276
以下是以往使用者和开发者提出的一些错误的漏洞情况。

0 commit comments

Comments
 (0)