-
Feature Request
-
Resolution: Won't Do
-
Major
-
None
-
None
-
None
-
None
-
Product / Portfolio Work
-
None
-
False
-
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
IBM Security team is asking for security use cases related to the following -
(1) Red Hat's view of what is critical from an auditing and logging point of view for ROSA (i.e. auditing capability agnostic to payloads)
(2) Best practices of IAM / authentication practices for ROSA
The original ticket was created in the CPSYN bucket but per Red Hat engineering and product management this needed to be opened as an RFE.
Contacts:
Henrik Back-Herke <henrikba@ie.ibm.com>
Liz Valletti <emvallet@us.ibm.com>