Skip to content

Commit a92ca4b

Browse files
authored
Update security-model.md
1 parent 3061e29 commit a92ca4b

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

docs/docs/en/contribute/join/security-model.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,10 @@ Apache DolphinScheduler supports four authentication methods: login with your ow
6969

7070
Administrator users can configure resources such as queues, tenants, users, alarm groups, worker groups, tokens, k8s clusters, k8s namespaces, etc. It is necessary to trust that the user's permission allocation, use, and maintenance of resources will not affect the platform and service itself.
7171

72+
## Network Environment
73+
74+
Apache DolphinScheduler's deployment and usage are based on the assumption that the user's network is secure and trustworthy. Apache DolphinScheduler does not address internal network cross-infiltration issues.
75+
7276
### Examples of Mistaken Security Vulnerabilities
7377

7478
The following are some erroneous vulnerabilities raised by users and developers in the past.

0 commit comments

Comments
 (0)