This is an automated email from the ASF dual-hosted git repository.

lidongdai pushed a commit to branch dev
in repository https://gitbox.apache.org/repos/asf/dolphinscheduler.git


The following commit(s) were added to refs/heads/dev by this push:
     new 1beecb07c1 [Doc-17096] add the security model reqeust of Network 
Environment (#17097)
1beecb07c1 is described below

commit 1beecb07c15888a58265784bc77162e521f80e66
Author: wangxj3 <[email protected]>
AuthorDate: Tue Apr 1 14:51:44 2025 +0800

    [Doc-17096] add the security model reqeust of Network Environment (#17097)
    
    * Update security-model.md
    
    * Update security-model.md
---
 docs/docs/en/contribute/join/security-model.md | 4 ++++
 docs/docs/zh/contribute/join/security-model.md | 4 ++++
 2 files changed, 8 insertions(+)

diff --git a/docs/docs/en/contribute/join/security-model.md 
b/docs/docs/en/contribute/join/security-model.md
index 782b6e5c76..9e4aeb2f07 100644
--- a/docs/docs/en/contribute/join/security-model.md
+++ b/docs/docs/en/contribute/join/security-model.md
@@ -69,6 +69,10 @@ Apache DolphinScheduler supports four authentication 
methods: login with your ow
 
 Administrator users can configure resources such as queues, tenants, users, 
alarm groups, worker groups, tokens, k8s clusters, k8s namespaces, etc. It is 
necessary to trust that the user's permission allocation, use, and maintenance 
of resources will not affect the platform and service itself.
 
+## Network Environment
+
+Apache DolphinScheduler's deployment and usage are based on the assumption 
that the user's network is secure and trustworthy. Apache DolphinScheduler does 
not address internal network cross-infiltration issues.
+
 ### Examples of Mistaken Security Vulnerabilities
 
 The following are some erroneous vulnerabilities raised by users and 
developers in the past.
diff --git a/docs/docs/zh/contribute/join/security-model.md 
b/docs/docs/zh/contribute/join/security-model.md
index 22b6c66a9b..c146da0653 100644
--- a/docs/docs/zh/contribute/join/security-model.md
+++ b/docs/docs/zh/contribute/join/security-model.md
@@ -67,6 +67,10 @@ Apache DolphinScheduler支持四种认证方式,自身账号密码登录,LDA
 
 
管理员用户可以配置队列、租户、用户、告警组、worker分组、令牌、k8s集群、k8s命名空间等资源,需要信用用户对资源的权限分配、使用、维护,都不会对平台和服务本身产生影响。
 
+## 网络环境
+
+Apache DolphinScheduler的部署和使用认为用户网络是安全和值得信任的,Apache DolphinScheduler不处理内网交叉渗透问题
+
 ### 误认为是安全漏洞的示例
 
 以下是以往使用者和开发者提出的一些错误的漏洞情况。

Reply via email to