Skip to content

Commit

Permalink
Update community/resources/zero-trust-whitepaper/v1/cloud-native-zero…
Browse files Browse the repository at this point in the history
…-trust-whitepaper.md

Co-authored-by: Emily Fox <[email protected]>
Signed-off-by: Mariusz Sabath <[email protected]>
  • Loading branch information
mrsabath and TheFoxAtWork authored Nov 13, 2024
1 parent 3184272 commit 56e7b7b
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -208,7 +208,7 @@ Organizations must recognize that all cloud native images inherently contain vul
Organizations must acknowledge that all deployed services are inherently vulnerable. This assumption should guide the planning and implementation of security measures. Any service deployed within a cloud native environment should be presumed to operate based on a vulnerable image and/or vulnerable configuration and that it will expose those vulnerabilities through its service API.

It is common for organizations to become aware of vulnerabilities when Common Vulnerabilities and Exposures (CVEs) related to their services are published. However, this awareness often comes after a period during which the services were susceptible to attack.
The absence of a known vulnerability does not equate to security; vulnerabilities may exist that have yet to be discovered or disclosed. CVEs are typically published following the detection and reporting by white hat security researchers, but malicious actors may exploit these vulnerabilities long before they are publicly known.
The absence of a known vulnerability does not mean a system is secure; vulnerabilities may exist that have yet to be discovered or disclosed. CVEs are typically published following the detection and reporting by white hat security researchers, but malicious actors may exploit these vulnerabilities long before they are publicly known.

### 3. Every Service Will be Exploited

Expand Down

0 comments on commit 56e7b7b

Please sign in to comment.