Published October 29, 2025 | Version v1
Dataset Open

Mapping of CIS Cloud Security Policies and Security Best Practices for Helm Charts

  • 1. ROR icon Vrije Universiteit Amsterdam
  • 2. ROR icon Thales (France)
  • 3. ROR icon University of Trento

Description

This dataset describes the mapping between the security policies and the security best practices of CIS (Center for Internet Security) for Helm Charts among the tools 

  • Checkov by BridgeCrew (36 policies)
  • Datree by Datree (60 polices)
  • KICS by Checkmarx (146 policies)
  • Kubelinter by StackRox (56 policies)
  • Kubeaudit by Shopify (14 policies)
  • Kubescape by ARMO (48 policies)
  • Terrascan by Tenable (35 policies)

The work is reported in the paper

  • Francesco Minna, Agathe Blaise, Katja Tuma, Fabio Massacci. "Automated Analysis of Security Policy Violations in Helm Charts". IEEE Transaction on Dependable and Secure Computing. To appear.

 

Files

Files (87.2 kB)

Name Size Download all
md5:e14bbf2b1ef94f8576bf250e370c93be
87.2 kB Download

Additional details

Funding

European Commission
Sec4AI4Sec - Cybersecurity for AI-Augmented Systems 101120393
European Commission
AssureMOSS - Assurance and certification in secure Multi-party Open Software and Services. 952647
Dutch Research Council
HEWSTI KICH1.VE01.20.004
Ministero dell'università e della ricerca
PE SERICS - Proejct COVERT P.N.R.R. PE00000014, CUP 000040104929

References

  • Francesco Minna, Agathe Blaise, Katja Tuma, Fabio Massacci. "Automated Analysis of Security Policy Violations in Helm Charts". IEEE Transaction on Dependable and Secure Computing. To appear.