From a87e559b44caf782f79633dd3b81a47ae8ae0e85 Mon Sep 17 00:00:00 2001 From: rohitrishim <88204255+rohitrishim@users.noreply.github.com> Date: Tue, 4 Jul 2023 10:15:41 +0530 Subject: [PATCH] update Readme.md with tag FiGHT instead of 5G --- README.md | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/README.md b/README.md index f28a35f7..a9604ac4 100644 --- a/README.md +++ b/README.md @@ -263,16 +263,16 @@ kubearmorpolicy.security.kubearmor.com/mysql-mysql-5-6-write-under-dev-dir creat **Now we are successfully applied all the hardening policies.** -## 5G Policies +## FiGHT Policies -To get hardening policies for 5G workloads use `karmor recommend` with the tag filter +To get hardening policies for FiGHT workloads use `karmor recommend` with the tag filter ```bash -$ karmor recommend -n default -t 5G +$ karmor recommend -n default -t FIGHT ``` ```console -karmor recommend -t 5G -n default (summary|✚3) +karmor recommend -t FIGHT -n default (summary|✚3) INFO[0000] Found outdated version of policy-templates Current Version=v0.2.3 INFO[0000] Downloading latest version [v0.2.4] INFO[0002] policy-templates updated Updated Version=v0.2.4 @@ -303,30 +303,30 @@ output report in out/report.txt ... +------------------------------------+--------------------------------+----------+--------+-----------------------------------+ | knoxuser-5g-sample-latest-trusted- | Restrict access to trusted | 1 | Block | MITRE | | cert-mod.yaml | certificated bundles in the OS | | | MITRE_T1552_unsecured_credentials | -| | image | | | FGT1555 5G | +| | image | | | FGT1555 FIGHT | +------------------------------------+--------------------------------+----------+--------+-----------------------------------+ | knoxuser-5g-sample-latest-5g- | Adversaries may search for | 1 | Block | MITRE | | tactic-credentials-from-password- | common password storage | | | MITRE_T1552_unsecured_credentials | -| stores.yaml | locations to obtain user | | | FGT1555 5G | +| stores.yaml | locations to obtain user | | | FGT1555 FIGHT | | | credentials. | | | | +------------------------------------+--------------------------------+----------+--------+-----------------------------------+ | knoxuser-5g-sample-latest-impair- | Adversaries may maliciously | 6 | Audit | MITRE | | defense.yaml | modify components of a victim | | | FGT1562 | -| | environment in order to | | | 5G | +| | environment in order to | | | FIGHT | | | hinder or disable defensive | | | | | | mechanisms. | | | | +------------------------------------+--------------------------------+----------+--------+-----------------------------------+ | knoxuser-5g-sample-latest-network- | Adversaries may attempt to | 5 | Audit | MITRE | | service-scanning.yaml | get a listing of services | | | FGT1046 | -| | running on remote hosts, | | | 5G | +| | running on remote hosts, | | | FIGHT | | | including those that may be | | | | | | vulnerable to remote software | | | | | | exploitation. | | | | +------------------------------------+--------------------------------+----------+--------+-----------------------------------+ | knoxuser-5g-sample-latest-remote- | Adversaries may use Valid | 3 | Audit | MITRE | -| services.yaml | Accounts to log into a service | | | 5G | +| services.yaml | Accounts to log into a service | | | FIGHT | | | specifically designed to | | | FGT1021 | | | accept remote connections, | | | | | | such as telnet, SSH, and VNC. | | | | +------------------------------------+--------------------------------+----------+--------+-----------------------------------+ -``` \ No newline at end of file +```