Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub.
Francesco MinnaFabio MassacciKatja TumaPublished in: CoRR (2024)
Keyphrases
- intrusion detection
- information security
- network security
- access control
- information assurance
- security requirements
- security issues
- security measures
- security management
- high security
- security properties
- computer security
- security systems
- data security
- real time
- security problems
- security level
- decision making
- security protocols
- key management
- database
- information systems
- statistical databases
- risk assessment
- personal information