Search: "restrict"
Apache Struts2 REST plug-in DoS vulnerability (CVE-2018-1327) - Web Application Firewall Documentation
use custom HTTP flood protection to restrict the frequency at which IP addresses send requests to pages where the XStream ...
Subaccount userguide - Function Compute Documentation
you want to restrict the RAM user to have read-only permissions such as getting functions, invoking functions, below policy ...
Best practices for HTTP flood protection - Web Application Firewall Documentation
a normal server does. In this case, the most effective measure is to restrict the request rate or forbid ...
Alibaba Cloud ECS Instance Security Checklist for Ubuntu 16.04 blog
Fail2Ban Consider installing a form of firewall to restrict unwanted and malicious traffic coming into your server. Also to prevent ...
Hybrid CI/CD - Hosting Dockerized Jenkins Slaves On Alibaba Cloud blog
restrict data to be accessible only to applicable CI/CD jobs. ## Why Docker Host As Build Slaves ### Resource Utilization Docker ...
Harden Kubernetes - Security Advisories Documentation
. Restrict direct access to Kubernetes nodesLogon to Kubernetes nodes through SSH or with an SSH key must be restricted to eliminate ...
Resource access management - Container Service Documentation
information leakage.You cannot restrict the access right of users, which may cause security risks due to improper operations ...
Android Development Security - Provider Component Security blog
/d2f6ebfcba4b3f7e810b51c302f3b0d1657b1e8f.png) MediaContentProvider implements the openFile() interface but does not restrict and filter inbound URIs ...
From Single-tenant IaaS to Multi-tenant PaaS - Multi-tenant Isolation with MaxCompute blog
sandbox and Python sandbox. The language-specific sandboxes implement innermost isolation. For example, Java UDF can restrict the ...