Skip to content

FEA017 - Implement security contexts (e.g., run as non-root user) to enhance container security

Feature ID FEA017
Subsystem the feature is part of PrestaShop as a Service
Responsible person Tugba Ilhan(0987)
Status proposal

All relevant issues related to or contributing to the definition of the feature are gathered here

[User Story 046] As a security engineer, I want our system to be integrated with a vulnerability scanning tool,So that I can continuously ensure our system's security and identify any potential vulnerabilities that may be exploited
[User Story 047] As a system administrator, I want the vulnerability scanning tool to send alerts directly to my dashboard,So that I can react promptly to any threats and mitigate any potential damage
[User Story 048] As a DevOps engineer, I want the scanning tool to be integrated into our CI/CD pipeline,So that I can catch potential vulnerabilities early in the development process before they get deployed to production
[User Story 049] As a team leader, I want the vulnerability scanning tool to be integrated in our workflow,So that I can assure our clients that our product is developed and maintained with best security practices in mind, and thus, improve customer trust and satisfaction

User interface mock-up

No changes to user interface

Testing / possible acceptance criteria

  • All containers run with a non-root user by default, and security contexts are defined in deployment configurations (e.g., Kubernetes YAML or Docker Compose).

  • A vulnerability scanning tool is integrated into the CI/CD pipeline and automatically scans container images during build and deployment stages.

  • The scanning tool sends real-time alerts to the system administrator’s dashboard when vulnerabilities are detected, and logs are accessible for auditing.

Back to page...