Configuring CodeArts Security
CodeArts offers various security features, including operational, code, and continuous delivery security. You can configure them as needed while using CodeArts.
Operational Security
CodeArts provides refined permission control, audit, and tracing to help you keep your data assets secure.
Security Configuration |
Description |
Suggestion |
Reference |
---|---|---|---|
Refined permission control |
CodeArts has a three-layer permission model for managing tenant-, project-, and instance-level permissions. |
Assign permissions to members by adhering to the principle of least privilege. |
|
Audit logs |
CodeArts services connect to Cloud Trace Service (CTS) to collect, store, and query operation records. |
Enable CTS for security analysis, compliance audit, resource tracing, and troubleshooting. |
|
IP address whitelist |
CodeArts Repo and CodeArts Artifact allow only whitelisted IP addresses to access data assets such as code and artifacts. |
Whitelist trusted IP addresses to prevent unauthorized users and attackers from accessing the system, reducing brute force cracking and DDoS attacks. |
|
Watermark |
CodeArts Repo allows you to add a visitor watermark to the source code page, enhancing code security and source tracing. |
Enable watermarking to protect the intellectual property rights of your code repos. |
Code Security
CodeArts Repo provides access tokens, deploy keys, and protected branches to safeguard your code assets.
Security Configuration |
Description |
Suggestion |
Reference |
---|---|---|---|
Access tokens |
CodeArts Repo allows each user to generate access tokens. Tokens are displayed only when generated. You can set the validity period (max. 1 year) of a token. By default, a token is valid for 1 month. |
When granting repo access to a third party, create an access token with a specific validity period. Access tokens prevent account and password disclosure. |
|
Deploy keys |
CodeArts Repo allows you to add deploy keys for each code repo. Users only have read permissions when accessing a repo using a deploy key. |
In code repo reading scenarios, such as builds, use a deploy key to clone a repo to improve code repo security. |
|
Protected branches |
You can set branch protection rules in a code repo to prevent branches from being modified or mis-deleted. |
Set a protection rule for the master branch so that code can only be merged into it via merge requests. Only authorized roles can push code to protected branches. |
|
Visibility |
CodeArts Repo allows you to set the following visibility options for code repos:
|
Set the visibility when creating a repo or adjust the visibility for an existing repo to scale to your needs. The administrator can determine whether to allow members to create "Public" code repos. |
|
Commit rules |
CodeArts Repo control code commits using specific rules. You can use the preconfigured commit rules or create new ones. |
Set commit rules for each repo to prevent your code from being modified without permission. |
Continuous Delivery Security
You can keep continuous delivery secure by setting private parameters and configuring host security groups.
Security Configuration |
Description |
Suggestion |
Reference |
---|---|---|---|
Private parameters |
CodeArts Build, CodeArts Deploy, CodeArts Pipeline, and CodeArts TestPlan provide private parameter settings. Private parameters are encrypted before storage. They are decrypted before use and are invisible in run logs. |
Set parameters that contain sensitive information to private parameters to prevent information leakage. |
|
Host security groups |
When deploying an application with the official agent pool, you can use a specified IP address to connect CodeArts Deploy to your hosts to run deployment scripts. To connect CodeArts Deploy to your hosts, configure a security group. |
Configure a security group that allows target and proxy hosts to communicate with CodeArts Deploy's official agent pool only through its public IP address. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot