...
This will be the 'software' counterpart of this work. The validation of the software configuration, should be performed against the requirements, that is preferably defined in a machine-readable format. Hence, this project relies heavily on an implementation of PDF 2.0 defined in CNTT.
Team
Name | Affiliation | Remarks |
---|---|---|
Sridhar K. N. Rao | Spirent | CIRV-SDV Lead |
Parth Yadav | Delhi University | LFN Intern |
Ashwin Nayak | NITK | LFN Intern |
Shivam Balikondwar | PICT | Student Volunteer |
Implementation of PDF 2.0 in JSON
...
Post-Deployment Software Validation: Security
Sl. No. | Validation Type | Description |
1 | Security: Right File Permissions | https://docs.openstack.org/security-guide/checklist.html |
2 | Security: Right Configurations | https://docs.openstack.org/security-guide/checklist.html |