diff --git a/docs/docs/en/contribute/join/security-model.md b/docs/docs/en/contribute/join/security-model.md index 782b6e5c768f..9e4aeb2f0701 100644 --- a/docs/docs/en/contribute/join/security-model.md +++ b/docs/docs/en/contribute/join/security-model.md @@ -69,6 +69,10 @@ Apache DolphinScheduler supports four authentication methods: login with your ow Administrator users can configure resources such as queues, tenants, users, alarm groups, worker groups, tokens, k8s clusters, k8s namespaces, etc. It is necessary to trust that the user's permission allocation, use, and maintenance of resources will not affect the platform and service itself. +## Network Environment + +Apache DolphinScheduler's deployment and usage are based on the assumption that the user's network is secure and trustworthy. Apache DolphinScheduler does not address internal network cross-infiltration issues. + ### Examples of Mistaken Security Vulnerabilities The following are some erroneous vulnerabilities raised by users and developers in the past. diff --git a/docs/docs/zh/contribute/join/security-model.md b/docs/docs/zh/contribute/join/security-model.md index 22b6c66a9b2d..c146da06530e 100644 --- a/docs/docs/zh/contribute/join/security-model.md +++ b/docs/docs/zh/contribute/join/security-model.md @@ -67,6 +67,10 @@ Apache DolphinScheduler支持四种认证方式,自身账号密码登录,LDA 管理员用户可以配置队列、租户、用户、告警组、worker分组、令牌、k8s集群、k8s命名空间等资源,需要信用用户对资源的权限分配、使用、维护,都不会对平台和服务本身产生影响。 +## 网络环境 + +Apache DolphinScheduler的部署和使用认为用户网络是安全和值得信任的,Apache DolphinScheduler不处理内网交叉渗透问题 + ### 误认为是安全漏洞的示例 以下是以往使用者和开发者提出的一些错误的漏洞情况。