Repository should be associated with an approved CI/CD app
ID |
cicd_unapproved_cicd_system |
Severity |
low |
Family |
CI/ CD Security |
Tags |
cicd-security, infrastructure, non-reachable, security |
Security
By bypassing the authorized CI/CD application (either by using shadow CI/CD or manual building) guardrails, tests and additional checks may not be performed on code changes. This may result in significantly degraded security.