From a5219c67547d424ed1d5953183bcb2f503836f4670abac296351ade6c1a6c3e5 Mon Sep 17 00:00:00 2001 From: "Marc S. Weidner" Date: Tue, 3 Jun 2025 10:44:59 +0200 Subject: [PATCH] V8.03.384.2025.06.03 Signed-off-by: Marc S. Weidner --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index d9c8f01..62b851d 100644 --- a/README.md +++ b/README.md @@ -66,8 +66,8 @@ add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; prelo The CI runners operate on a dedicated host system located in a completely separate Autonomous System (AS). This host is solely dedicated to providing CI runners and does not perform any other tasks. Each runner is hermetically isolated from others using non-privileged, shell-less user accounts with no direct login capability. Additionally, each runner executes within its own -separate directory tree, employs `DynamicUser` features, and adheres to strict systemd hardening policies (achieving a security -rating of 2.6). Docker containers used by runners do not run in privileged mode. Security is further enhanced through the use +separate directory tree, employs `DynamicUser` features, and adheres to strict systemd hardening policies (achieving a ``systemd-analyze security`` +rating of **``2.6``**). Docker containers used by runners do not run in privileged mode. Security is further enhanced through the use of both UFW software firewalls and dedicated hardware firewall appliances. ## 1.2. Immutable Source-of-Truth System