Published October 29, 2025
| Version v1
Dataset
Open
Mapping of CIS Cloud Security Policies and Security Best Practices for Helm Charts
Authors/Creators
Description
This dataset describes the mapping between the security policies and the security best practices of CIS (Center for Internet Security) for Helm Charts among the tools
- Checkov by BridgeCrew (36 policies)
- Datree by Datree (60 polices)
- KICS by Checkmarx (146 policies)
- Kubelinter by StackRox (56 policies)
- Kubeaudit by Shopify (14 policies)
- Kubescape by ARMO (48 policies)
- Terrascan by Tenable (35 policies)
The work is reported in the paper
- Francesco Minna, Agathe Blaise, Katja Tuma, Fabio Massacci. "Automated Analysis of Security Policy Violations in Helm Charts". IEEE Transaction on Dependable and Secure Computing. To appear.
Files
Files
(87.2 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:e14bbf2b1ef94f8576bf250e370c93be
|
87.2 kB | Download |
Additional details
Funding
- European Commission
- Sec4AI4Sec - Cybersecurity for AI-Augmented Systems 101120393
- European Commission
- AssureMOSS - Assurance and certification in secure Multi-party Open Software and Services. 952647
- Dutch Research Council
- HEWSTI KICH1.VE01.20.004
- Ministero dell'università e della ricerca
- PE SERICS - Proejct COVERT P.N.R.R. PE00000014, CUP 000040104929
References
- Francesco Minna, Agathe Blaise, Katja Tuma, Fabio Massacci. "Automated Analysis of Security Policy Violations in Helm Charts". IEEE Transaction on Dependable and Secure Computing. To appear.