(no title)
stroebs | 24 days ago
Part of the reason we pay the big license fee is so we have someone to turn to when it inevitably breaks because we’ve used it in a way nobody has before. In Jan last year we were using 30TB of artifact storage in S3. That’s 140TB today.
Where do you get your CVE data? Would built artifacts have their CVEs updated after the fact? Do you have blocking policies on artifacts based on CVEs, licenses, artifact age, etc?
bsgeraci|24 days ago
I still need to put some e2e testing on those policies. https://demo.artifactkeeper.com/security/policies here is a demo and you can add a policy. Again that one I need to make a series of end to end testing but that was designed in mind :) I really want a staging area and promotion of packages after scans.
On my list of things to do.
stroebs|24 days ago
It's a great start. What I can say is that granularity of CVE's in policies will become important for larger consumers. We have about 4.5mn artifacts so even getting CVSSv3 10's blocked was a challenge, let alone 9.8.
raphinou|24 days ago
Edit: the project if anyone reading this is interested: http://github.com/asfaload/asfaload (looking for feedback!)
eyeris|24 days ago
M0r13n|24 days ago
gjvc|24 days ago
moezd|24 days ago
bsgeraci|24 days ago
SHould have info on the CVE, please leave some issues on the repository if you want to see more infromatoin on the actual dashbaord/ui :)
Thanks for the feedback!
bsgeraci|24 days ago