{"id":68081,"date":"2020-12-28T13:18:51","date_gmt":"2020-12-28T11:18:51","guid":{"rendered":"https:\/\/jfrog.com\/?p=68081"},"modified":"2021-01-12T05:03:46","modified_gmt":"2021-01-12T03:03:46","slug":"adding-helm-chart-security-mitigation-notes-to-chartcenter-2","status":"publish","type":"post","link":"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/","title":{"rendered":"ChartCenter\u306bHelm Chart\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8efd\u6e1b\u30e1\u30e2(Mitigation Notes)\u3092\u8ffd\u52a0\u3059\u308b"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignnone size-full wp-image-67596\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07172812\/863_300.png\" alt=\"\" width=\"864\" height=\"301\" srcset=\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07172812\/863_300.png?speedsize=w_864 864w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07172812\/863_300.png?speedsize=w_300 300w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07172812\/863_300.png?speedsize=w_768 768w\" sizes=\"(max-width: 864px) 100vw, 864px\" \/><\/p>\n<p><span style=\"font-weight: 400\">\u4eca\u5e74\u306e\u521d\u3081\u306bChartCenter\u3092\u7acb\u3061\u4e0a\u3052\u307e\u3057\u305f\u3002\u3053\u308c\u306fKubernetes\u958b\u767a\u8005\u304c<\/span><a href=\"https:\/\/jfrog.com\/blog\/ja\/launching-jfrog-chartcenter-helm-chart-repository\/\"><span style=\"font-weight: 400\">Helm Chart\u3092\u898b\u3064\u3051\u308b<\/span><\/a><span style=\"font-weight: 400\">\u305f\u3081\u306e\u6700\u65b0\u306e\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3067\u3059\u3002\u3053\u306e\u65b0\u3057\u3044\u7121\u6599\u306e<\/span><a href=\"https:\/\/chartcenter.io\/\"><span style=\"font-weight: 400\">Helm\u30bb\u30f3\u30c8\u30e9\u30eb\u30ea\u30dd\u30b8\u30c8\u30ea<\/span><\/a><span style=\"font-weight: 400\">\u306fChart\u306e\u4e0d\u5909\u6027\u3092\u5ff5\u982d\u306b\u7f6e\u3044\u3066\u69cb\u7bc9\u3055\u308c\u307e\u3057\u305f\u3002\u3064\u307e\u308a\u3001\u5143\u306e\u30bd\u30fc\u30b9\u304c\u30c0\u30a6\u30f3\u3057\u3066\u3082\u3001Helm Chart\u306e\u3059\u3079\u3066\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u3068ChartCenter\u5185\u306e\u3059\u3079\u3066\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u304c\u5e38\u306b\u5229\u7528\u3067\u304d\u308b\u3068\u3044\u3046\u3053\u3068\u3067\u3059\u3002HelmHub\u304c\u975e\u63a8\u5968\u306b\u306a\u3063\u305f\u3053\u3068\u3067\u3001\u4e0d\u5909\u6027\u306f\u7279\u306b\u91cd\u8981\u306b\u306a\u308a\u307e\u3057\u305f\u3002Chart\u3068\u305d\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u306f\u591a\u304f\u304cChartCenter\u4e0a\u306b\u5b58\u5728\u3057\u7d9a\u3051\u3066\u304a\u308a\u3001\u5404\u30d0\u30fc\u30b8\u30e7\u30f3\u306b\u306f<\/span><a href=\"https:\/\/jfrog.com\/ja\/blog\/for-helm-chart-dependencies-depend-on-chartcenter\/\"><span style=\"font-weight: 400\">Helm Chart\u306e\u4f9d\u5b58\u95a2\u4fc2<\/span><\/a><span style=\"font-weight: 400\">\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u3001Helm\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u3001\u4ed6\u306eChart\u304c\u3053\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u3092\u4f7f\u7528\u3057\u3066\u3044\u308b\u6570\u306a\u3069\u3001\u8c4a\u5bcc\u306a\u30e1\u30bf\u30c7\u30fc\u30bf\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002<\/span><\/p>\n<p><span style=\"font-weight: 400\">ChartCenter\u306e\u6700\u5927\u306e\u7279\u5fb4\u306f<\/span><a href=\"https:\/\/jfrog.com\/ja\/blog\/securing-your-kubernetes-journey-with-chartcenter\/\"><span style=\"font-weight: 400\">\u7121\u6599\u3067\u898b\u3089\u308c\u308b\u8106\u5f31\u6027\u306e\u60c5\u5831<\/span><\/a><span style=\"font-weight: 400\">\u3067\u3059\u3002\u3059\u3079\u3066\u306eChart\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u306b\u3064\u3044\u3066JFrog Xray\u3092\u4f7f\u7528\u3057\u3066<\/span><a href=\"https:\/\/jfrog.com\/ja\/xray\/\"><span style=\"font-weight: 400\">\u8106\u5f31\u6027\u3092\u30b9\u30ad\u30e3\u30f3<\/span><\/a><span style=\"font-weight: 400\">\u3057\u3001CVSS 2\u306e\u8a55\u4fa1\u3092\u4f7f\u7528\u3057\u3066\u3001\u9ad8\u3001\u4e2d\u3001\u4f4e\u3001\u672a\u77e5\u3044\u305a\u308c\u304b\u306eCVE\u30b9\u30b3\u30a2\u3092\u7b97\u51fa\u3057\u307e\u3059\u3002<\/span><\/p>\n<h2><span style=\"font-weight: 400\">ChartCenter\u3067\u660e\u3089\u304b\u306b\u306a\u308b\u8106\u5f31\u6027<\/span><\/h2>\n<p><span style=\"font-weight: 400\">CVE (Common Vulnerabilities and Exposures) \u30ea\u30b9\u30c8\u306f\u56fd\u571f\u5b89\u5168\u4fdd\u969c\u7701 (DHS) \u306eOffice of Cybersecurity and Information Assurance (OCSIA) \u304c\u4e3b\u50ac\u3059\u308b\u3001\u5831\u544a\u3055\u308c\u305f\u8106\u5f31\u6027\u306e\u516c\u958b\u30ea\u30b9\u30c8\u3067\u3059\u3002\u591a\u304f\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f01\u696d\u306f\u7d44\u7e54\u304c\u81ea\u793e\u306e\u554f\u984c\u3092\u660e\u78ba\u306b<\/span><span style=\"font-weight: 400\">\u7406\u89e3\u3067\u304d\u308b\u3088\u3046\u306b\u3001CVE\u3084\u305d\u308c\u4ee5\u5916\u306e\u72ec\u81ea\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u3092\u4f7f\u7528\u3057\u3066\u3044\u307e\u3059\u3002CVE\u306f\u7279\u5b9a\u306e\u8106\u5f31\u6027\u3084\u30a8\u30af\u30b9\u30dd\u30fc\u30b8\u30e3\u30fc\uff08\u30b7\u30b9\u30c6\u30e0\u4e0a\u306e\u653b\u6483\u53ef\u80fd\u306a\u4e0d\u5099\u306a\u3069\uff09\u306b\u5bfe\u3059\u308b\u6a19\u6e96\u5316\u3055\u308c\u305f\u8b58\u5225\u5b50\u3092\u4f5c\u6210\u3059\u308b\u3053\u3068\u3067\u3001\u7d44\u7e54\u9593\u3067\u65e2\u77e5\u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u60c5\u5831\u5171\u6709\u3092\u5bb9\u6613\u306b\u3067\u304d\u307e\u3059\u3002<\/span><span style=\"font-weight: 400\">CVE\u306b\u3088\u308a\u3001\u7d44\u7e54\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u306e\u9069\u7528\u7bc4\u56f2\u3092\u8a55\u4fa1\u3059\u308b\u305f\u3081\u306e\u30d9\u30fc\u30b9\u30e9\u30a4\u30f3\u3092\u8a2d\u5b9a\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002CVE \u306e\u5171\u901a\u8b58\u5225\u5b50\u306f\u5404\u30c4\u30fc\u30eb\u304c\u4f55\u3092\u30ab\u30d0\u30fc\u3057\u3066\u3044\u3066\u3001\u305d\u306e\u30c4\u30fc\u30eb\u304c\u7d44\u7e54\u306b\u3068\u3063\u3066\u3069\u306e\u7a0b\u5ea6\u9069\u5207\u306a\u306e\u304b\u3092\u78ba\u8a8d\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u5404Chart\u30da\u30fc\u30b8\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bf\u30d6\u306b\u79fb\u52d5\u3059\u308b\u3068\u3001\u30e6\u30fc\u30b6\u30fc\u306fCVE ID\u3001\u6982\u8981\u3001\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u304a\u3088\u3073\u554f\u984c\u304c\u3042\u308b\u30a4\u30e1\u30fc\u30b8\u3068\u3044\u3063\u305f\u8106\u5f31\u6027\u306e\u8a73\u7d30\u3092\u78ba\u8a8d\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-large wp-image-61299\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171235\/ChartCtr-SecMit-04-1024x381.jpg\" alt=\"ChartCenter Vulnerability Information\" width=\"1024\" height=\"381\" srcset=\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171235\/ChartCtr-SecMit-04.jpg?speedsize=w_1024 1024w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171235\/ChartCtr-SecMit-04.jpg?speedsize=w_300 300w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171235\/ChartCtr-SecMit-04.jpg?speedsize=w_768 768w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171235\/ChartCtr-SecMit-04.jpg?speedsize=w_1536 1536w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171235\/ChartCtr-SecMit-04.jpg?speedsize=w_1999 1999w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h2><span style=\"font-weight: 400\">Mitigation Notes<\/span><\/h2>\n<p><span style=\"font-weight: 400\">\u79c1\u305f\u3061\u304c\u3053\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30c6\u30b9\u30c8\u3057\u3066\u3044\u308b\u9593\u306b\u3001\u69d8\u3005\u306a\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u30e1\u30f3\u30d0\u30fc\u304b\u3089\u5f97\u305f\u30d5\u30a3\u30fc\u30c9\u30d0\u30c3\u30af\u304c\u3042\u308a\u307e\u3059\u3002\u8106\u5f31\u6027\u306e\u591a\u304f\u306fChart\u306e\u30e1\u30f3\u30c6\u30ca\u30fc\u304c\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u3067\u304d\u306a\u3044\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u306e\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u306b\u3042\u308b\u305f\u3081\u3001\u3069\u306eCVE\u304c\u5b9f\u969b\u306b\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b\u306b\u3064\u3044\u3066\u30a8\u30f3\u30c9\u30e6\u30fc\u30b6\u306b\u4f55\u3089\u304b\u306e\u30b3\u30f3\u30c6\u30ad\u30b9\u30c8\u3092\u63d0\u4f9b\u3059\u308b\u6a5f\u80fd\u3092\u30e1\u30f3\u30c6\u30ca\u30fc\u306b\u4e0e\u3048\u308b\u3053\u3068\u304c\u3067\u304d\u308c\u3070\u3088\u308a\u826f\u3044\u3068\u3044\u3046\u3082\u306e\u3067\u3059\u3002<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u6b63\u3057\u304f\u30d0\u30e9\u30f3\u30b9\u3092\u53d6\u308aChart\u306e\u30e1\u30f3\u30c6\u30ca\u30fc\u3068\u30e6\u30fc\u30b6\u30fc\u4e21\u65b9\u306e\u610f\u601d\u6c7a\u5b9a\u3092\u652f\u3048\u308b\u30c4\u30fc\u30eb\u3068\u3059\u308b\u305f\u3081\u306b\u3001\u79c1\u305f\u3061\u306f \u201c<\/span><a href=\"https:\/\/jfrog.com\/blog\/helm-chart-security-mitigation-in-chartcenter\/\"><span style=\"font-weight: 400\">Mitigation Notes<\/span><\/a><span style=\"font-weight: 400\">\u201d\u3068\u547c\u3070\u308c\u308b\u6a5f\u80fd\u3092\u4f5c\u6210\u3057\u307e\u3057\u305f\u3002ClaireOS\u3084DockerHub\u306a\u3069\u591a\u304f\u306e\u30c4\u30fc\u30eb\u304c\u30b3\u30f3\u30c6\u30ca\u30b9\u30ad\u30e3\u30f3\u3092\u7121\u6599\u3067\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002\u3057\u304b\u3057\u3001JFrog\u306eChartCenter\u306f1\u3064\u306e\u30d3\u30e5\u30fc\u3067\u3059\u3079\u3066\u3092\u5bb9\u6613\u306b\u95b2\u89a7\u3067\u304d\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u8907\u6570\u30d0\u30fc\u30b8\u30e7\u30f3\u306b\u6e21\u3063\u3066\u554f\u984c\u3092\u78ba\u8a8d\u3067\u304d\u308bUI\u4e0a\u306b\u60c5\u5831\u304c\u8868\u793a\u3055\u308c\u308b\u521d\u306e\u30c4\u30fc\u30eb\u3067\u3057\u305f\u3002\u3053\u306e\u3053\u3068\u304b\u3089\u3001\u7d44\u7e54\u304cChart\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u30e6\u30fc\u30b6\u30fc\u3068\u3084\u308a\u3068\u308a\u3059\u308b\u305f\u3081\u306e\u65b9\u6cd5\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u304c\u6b63\u3057\u3044\u3053\u3068\u3060\u3068\u5206\u304b\u308a\u307e\u3057\u305f\u3002<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u307e\u305f\u3001\u3053\u306e\u554f\u984c\u3092\u304d\u3063\u304b\u3051\u306bHelm Chart\u306e\u30e1\u30f3\u30c6\u30ca\u30fc\u304cChartCenter UI\u4e0a\u3067\u30e6\u30fc\u30b6\u30fc\u3068\u76f4\u63a5\u5bfe\u8a71\u3067\u304d\u308b\u3088\u3046\u306a\u65b0\u6a5f\u80fd\u3092\u69cb\u7bc9\u3059\u308b\u3053\u3068\u306b\u306a\u308a\u307e\u3057\u305f\u3002\u3053\u306e\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306f\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u5168\u4f53\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u3001Chart\u306e\u30e6\u30fc\u30b6\u30fc\u306b\u900f\u660e\u6027\u3092\u63d0\u4f9b\u3057\u7d9a\u3051\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002\u3053\u306e\u30d0\u30e9\u30f3\u30b9\u3092\u6b63\u3057\u304f\u3068\u308b\u4f5c\u696d\u306f\u8208\u5473\u6df1\u3044\u3082\u306e\u3067\u3057\u305f\u3002\u4e2d\u7a0b\u5ea6\u3001\u4f4e\u7a0b\u5ea6\u3001\u672a\u77e5\u306eCVE\u306e\u8a73\u7d30\u3092\u3059\u3079\u3066\u7d99\u7d9a\u7684\u306b\u516c\u958b\u3059\u308b\u3053\u3068\u304b\u3089\u59cb\u3081\u307e\u3057\u305f\u304c\u3001\u9ad8\u3044\u8106\u5f31\u6027\u306e\u30c7\u30fc\u30bf\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u306e\u306f\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u30e6\u30fc\u30b6\u30fc\u304cChartCenter\u306b\u30ed\u30b0\u30a4\u30f3\u3057\u305f\u5834\u5408\u306b\u9650\u3089\u308c\u307e\u3059\u3002<\/span><\/p>\n<h3><span style=\"font-weight: 400\">\u201cMaintainer Notes\u201d\u306e\u63d0\u4f9b<\/span><\/h3>\n<p><span style=\"font-weight: 400\">CVE\u306b\u5bfe\u3059\u308bMitigation Note\u3092\u63d0\u4f9b\u3059\u308b\u306b\u306f<\/span><a href=\"https:\/\/github.com\/jfrog\/chartcenter\/blob\/master\/docs\/securitymitigationspec.md\"><span style=\"font-weight: 400\">security-mitigation.yaml<\/span><\/a><span style=\"font-weight: 400\">\u30d5\u30a1\u30a4\u30eb\u3092\u4f7f\u7528\u3057\u307e\u3059\u3002\u30e6\u30fc\u30b6\u30fc\u304c\u3053\u308c\u3092\u8a2d\u5b9a\u3059\u308b\u3068\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bf\u30d6\u306e\u5404CVE\u306e\u6a2a\u306b\u30a2\u30a4\u30b3\u30f3\u304c\u8868\u793a\u3055\u308c\u307e\u3059\u3002<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-large wp-image-61300\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171603\/ChartCtr-SecMit-05-1024x343.png\" alt=\"ChartCenter With Mitigation Note\" width=\"1024\" height=\"343\" srcset=\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171603\/ChartCtr-SecMit-05.png?speedsize=w_1024 1024w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171603\/ChartCtr-SecMit-05.png?speedsize=w_300 300w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171603\/ChartCtr-SecMit-05.png?speedsize=w_768 768w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171603\/ChartCtr-SecMit-05.png?speedsize=w_1536 1536w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171603\/ChartCtr-SecMit-05.png?speedsize=w_1999 1999w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><span style=\"font-weight: 400\">\u30a2\u30a4\u30b3\u30f3\u3092\u30af\u30ea\u30c3\u30af\u3059\u308b\u3068\u6b21\u306e\u3088\u3046\u306a\u6587\u7ae0\u304c\u8868\u793a\u3055\u308c\u307e\u3059:<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-61301 size-full\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171623\/ChartCtr-SecMit-06.png\" alt=\"ChartCenter Maintaner Notes\" width=\"548\" height=\"195\" srcset=\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171623\/ChartCtr-SecMit-06.png?speedsize=w_548 548w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/07\/22171623\/ChartCtr-SecMit-06.png?speedsize=w_300 300w\" sizes=\"(max-width: 548px) 100vw, 548px\" \/><\/p>\n<h3><span style=\"font-weight: 400\">\u8efd\u6e1b\u30e1\u30e2\u3068\u30a2\u30c9\u30d0\u30a4\u30b9\u306e\u4f8b<\/span><\/h3>\n<p><span style=\"font-weight: 400\">\u30e6\u30fc\u30b6\u30fc\u306b\u3053\u306e\u624b\u306e\u30a2\u30c9\u30d0\u30a4\u30b9\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u306b\u6163\u308c\u3066\u3044\u306a\u3044\u65b9\u306f\u624b\u672c\u3068\u306a\u308b\u4f01\u696d\u304c\u305f\u304f\u3055\u3093\u3042\u308b\u3053\u3068\u3092\u77e5\u3063\u3066\u304a\u3044\u3066\u304f\u3060\u3055\u3044\u3002\u3053\u308c\u3089\u306e\u4f01\u696d\u306e\u591a\u304f\u306f\u30b3\u30fc\u30c9\u5185\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8106\u5f31\u6027\u3092\u8efd\u6e1b\u3059\u308b\u305f\u3081\u306e\u72ec\u81ea\u306e\u30d7\u30ed\u30bb\u30b9\u3092\u6301\u3063\u3066\u304a\u308a\u3001\u30b5\u30a4\u30c8\u4e0a\u306b\u5c02\u7528\u306e\u30da\u30fc\u30b8\u3084\u30dd\u30fc\u30bf\u30eb\u3092\u69cb\u7bc9\u3057\u3066\u60c5\u5831\u3092\u516c\u958b\u3057\u3066\u3044\u308b\u5834\u5408\u3082\u3042\u308a\u307e\u3059\u3002\u4ee5\u4e0b\u306b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u3078\u5bfe\u51e6\u3059\u308b\u305f\u3081\u306b\u4f1a\u793e\u6a19\u6e96\u306e\u8efd\u6e1b\u52e7\u544a\u3092\u5b9f\u65bd\u3057\u3066\u3044\u308b\u4f01\u696d\u306e\u4f8b\u3068\u3001\u305d\u306e\u65b9\u91dd\u306e\u7c21\u5358\u306a\u6982\u8981\u3092\u793a\u3057\u307e\u3059\u3002\u3053\u308c\u3089\u306e\u4f8b\u306f\u81ea\u793e\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u306b\u3082\u5229\u7528\u3067\u304d\u307e\u3059\u3002<\/span><\/p>\n<p><b>Drupal<\/b><span style=\"font-weight: 400\">:\u00a0 Drupal\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c1\u30fc\u30e0\u306fDrupal\u30b3\u30a2\u3084\u30b3\u30f3\u30c8\u30ea\u30d3\u30e5\u30fc\u30c8\u3057\u305f\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u3067\u5831\u544a\u3055\u308c\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u554f\u984c\u3092\u30b5\u30a4\u30c8\u30aa\u30fc\u30ca\u30fc\u306b\u901a\u77e5\u3059\u308b\u305f\u3081\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u52e7\u544a\u306e\u516c\u958b\u30a2\u30ca\u30a6\u30f3\u30b9\u3092\u7ba1\u7406\u3057\u3066\u3044\u307e\u3059\u3002\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u52e7\u544a\u3067\u306f\u958b\u767a\u8005\u304c\u554f\u984c\u3092\u4fee\u6b63\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u624b\u9806\u3082\u63d0\u4f9b\u3055\u308c\u307e\u3059\u3002Drupal\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u52e7\u544a\u306e\u30d7\u30ed\u30bb\u30b9\u306b\u3064\u3044\u3066\u306e\u8a73\u7d30\u306f<\/span><a href=\"https:\/\/www.drupal.org\/drupal-security-team\/security-advisory-process-and-permissions-policy\"><span style=\"font-weight: 400\">\u3053\u3061\u3089\u3092\u3054\u89a7\u304f\u3060\u3055\u3044<\/span><\/a><span style=\"font-weight: 400\">\u3002<\/span><\/p>\n<p><b>\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8<\/b><span style=\"font-weight: 400\">: \u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u306f\u60aa\u7528\u53ef\u80fd\u6027\u30a4\u30f3\u30c7\u30c3\u30af\u30b9\u3092\u6301\u3063\u3066\u3044\u307e\u3059\u3002\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u30d7\u30ed\u30b0\u30e9\u30e0\u306b\u95a2\u9023\u3059\u308b\u91cd\u8981\u5ea6\u30fb\u91cd\u5927\u5ea6\u306e\u9ad8\u3044\u5404\u8106\u5f31\u6027\u306e\u60aa\u7528\u306e\u53ef\u80fd\u6027\u3092\u8a55\u4fa1\u3057\u3001\u6bce\u6708\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u66f4\u65b0\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u8a73\u7d30\u60c5\u5831\u306e\u4e00\u90e8\u3068\u3057\u3066\u60aa\u7528\u53ef\u80fd\u6027\u60c5\u5831\u3092\u516c\u958b\u3057\u3066\u3044\u307e\u3059\u3002\u8a73\u7d30\u3092\u516c\u958b\u3057\u305f\u5f8c\u306b\u3001\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u304c\u5fc5\u8981\u3060\u3068\u5224\u65ad\u3057\u305f\u5834\u5408\u306fExploitability Index Assessment(\u60aa\u7528\u53ef\u80fd\u6027\u6307\u6a19)\u3092\u5909\u66f4\u3057\u3001\u6280\u8853\u7684\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u901a\u77e5\u3067\u9867\u5ba2\u306b\u901a\u9054\u3057\u307e\u3059\u3002<\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/2533623\/microsoft-security-advisory-insecure-library-loading-could-allow-remot\"><span style=\"font-weight: 400\">\u305d\u306e\u6d41\u308c\u304c\u78ba\u8a8d\u3067\u304d\u308b\u4f8b<\/span><\/a><span style=\"font-weight: 400\">\u3082\u3042\u308a\u307e\u3059\u3002<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400\">ChartCenter Mitigation YAML<\/span><\/h2>\n<p><span style=\"font-weight: 400\">YAML\u30d5\u30a1\u30a4\u30eb\u3092\u8a18\u8ff0\u5f8c\u306f\u6b21\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u306eHelm Chart\u306b\u305d\u306e\u30d5\u30a1\u30a4\u30eb\u3092\u542b\u3081\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u307e\u305f\u306fHelm Chart\u306e\u6240\u6709\u8005\u3067\u3042\u308b\u3053\u3068\u304c\u78ba\u8a8d\u3067\u304d\u308c\u3070\u3001\u76f4\u63a5<\/span><span style=\"font-weight: 400\">security-mitigation.yaml<\/span><span style=\"font-weight: 400\">\u30d5\u30a1\u30a4\u30eb\u3092\u30e1\u30fc\u30eb\u3067\u9001\u4fe1\u3059\u308b\u3053\u3068\u3082\u3067\u304d\u307e\u3059\uff08\u30e6\u30fc\u30b6\u30fc\u306e\u30e1\u30fc\u30eb\u30a2\u30c9\u30ec\u30b9\u304cChart\u306e\u30ea\u30dd\u30b8\u30c8\u30ea\u60c5\u5831\u306b\u542b\u307e\u308c\u3066\u3044\u308b\u3053\u3068\u304c\u78ba\u8a8d\u3055\u308c\u307e\u3059\uff09\u3002<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8efd\u6e1b\u6a5f\u80fd\u3067\u306f3\u3064\u306e\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u3092\u30b5\u30dd\u30fc\u30c8\u3057\u3066\u3044\u307e\u3059\u3002<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">\u4f5c\u6210\u8005\u304c\u5168\u4f53\u307e\u305f\u306fCVE\u56fa\u6709\u306e\u8efd\u6e1b\u60c5\u5831\u3092\u63d0\u4f9b\u3067\u304d\u308b<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">wiki\u3084\u30a6\u30a7\u30d6\u30da\u30fc\u30b8\u4e0a\u3067\u5916\u90e8\u30db\u30b9\u30c8\u3055\u308c\u3066\u3044\u308b\u8efd\u6e1b\u60c5\u5831\u306e\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u3092\u4f5c\u6210\u8005\u304c\u63d0\u793a\u3067\u304d\u308b<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">\u5916\u90e8\u30db\u30b9\u30c8\u3055\u308c\u305f<\/span><span style=\"font-weight: 400\">security-mitigation.yaml<\/span><span style=\"font-weight: 400\">\u3092\u4f5c\u6210\u8005\u304c\u63d0\u793a\u3067\u304d\u308b<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-large wp-image-67597\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07173327\/security-mitigation-yaml-1024x483.png\" alt=\"ChartCenter Security Mitigation YAML\" width=\"1024\" height=\"483\" srcset=\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07173327\/security-mitigation-yaml.png?speedsize=w_1024 1024w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07173327\/security-mitigation-yaml.png?speedsize=w_300 300w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07173327\/security-mitigation-yaml.png?speedsize=w_768 768w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07173327\/security-mitigation-yaml.png?speedsize=w_1536 1536w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07173327\/security-mitigation-yaml.png?speedsize=w_1600 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Field<\/b><\/td>\n<td><b>Description<\/b><\/td>\n<td><b>Type<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400\"><code>summary<\/code><\/span><\/td>\n<td><span style=\"font-weight: 400\">Overall mitigation summary that applies to all chart versions<\/span><\/td>\n<td><span style=\"font-weight: 400\">text<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400\"><code>securityAdvisoryUrl<\/code><\/span><\/td>\n<td><span style=\"font-weight: 400\">Link pointing to a mitigation information hosted externally such as wiki, web page, etc.<\/span><\/td>\n<td><span style=\"font-weight: 400\">url<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400\"><code>useMitigationExternalFile<\/code><\/span><\/td>\n<td><span style=\"font-weight: 400\">true means <code>security-mitigation.yaml<\/code> is hosted somewhere else. false means the content of the current file represents security mitigation information. Default value: false<\/span><\/td>\n<td><span style=\"font-weight: 400\">true\/false<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400\"><code>mitigationExternalFileUrl<\/code><\/span><\/td>\n<td><span style=\"font-weight: 400\">If set to true, then this parameter points to a url of externally hosted <code>security-mitigation.yaml<\/code><\/span><\/td>\n<td><span style=\"font-weight: 400\">url<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400\"><code>mitigations: cves<\/code><\/span><\/td>\n<td><span style=\"font-weight: 400\">List of CVEs for which mitigation notes are being provided.<\/span><\/td>\n<td><span style=\"font-weight: 400\">CVE-YYYY-NNNN<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400\"><code>mitigations: cves: affectedPackageUri<\/code><\/span><\/td>\n<td><span style=\"font-weight: 400\">Indicates package Uri for which the security mitigation is provided. Currently we support only two package uri:\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Docker <code>docker:\/\/docker.io\/bitnami\/postgres<\/code> Helm <code>helm:\/\/artifactory<\/code><\/span><\/td>\n<td><span style=\"font-weight: 400\">uri<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400\"><code>mitigations: cves: affectedVersions<\/code><\/span><\/td>\n<td><span style=\"font-weight: 400\">SemVer Constraint from <code>Masterminds\/semver<\/code> as used on <code>Chart.yaml<\/code> for kubeVersion specifying which versions should use the mitigation information.<\/span><\/td>\n<td><span style=\"font-weight: 400\">Example: &#8220;&gt; 1.2.x<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400\"><code>mitigations: cves: description<\/code><\/span><\/td>\n<td><span style=\"font-weight: 400\">Mitigation notes at CVE level.<\/span><\/td>\n<td><span style=\"font-weight: 400\">text description<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><span style=\"font-weight: 400\">\u6b21\u306e\u30b9\u30c6\u30c3\u30d7<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Chart\u30e1\u30f3\u30c6\u30ca\u30fc\u306e\u65b9\u306f<\/span><a href=\"https:\/\/github.com\/jfrog\/chartcenter\/blob\/master\/docs\/securitymitigationspec.md\"><span style=\"font-weight: 400\">UI\u306eMitigtion Notes\u6a5f\u80fd\u3092\u6709\u52b9\u306b\u3059\u308b\u65b9\u6cd5<\/span><\/a><span style=\"font-weight: 400\">\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002\u305d\u306e\u5f8c\u3001<\/span><a href=\"https:\/\/github.com\/jfrog\/chartcenter\/blob\/master\/docs\/security-mitigation.yaml\"><span style=\"font-weight: 400\">security-mitigation.yaml<\/span><\/a><span style=\"font-weight: 400\">\u30d5\u30a1\u30a4\u30eb\u3092\u4f5c\u6210\u3057\u3066\u304f\u3060\u3055\u3044\u3002\u3054\u8cea\u554f\u304c\u3042\u308b\u5834\u5408\u306f<\/span><a href=\"mailto:chartcenter@jfrog.com\"><span style=\"font-weight: 400\">chartcenter@jfrog.com<\/span><\/a><span style=\"font-weight: 400\">\u307e\u3067\u30e1\u30fc\u30eb\u3067\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4eca\u5e74\u306e\u521d\u3081\u306bChartCenter\u3092\u7acb\u3061\u4e0a\u3052\u307e\u3057\u305f\u3002\u3053\u308c\u306fKubernetes\u958b\u767a\u8005\u304cHelm Chart\u3092\u898b &hellip;<\/p>\n","protected":false},"author":143,"featured_media":67593,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[9189],"tags":[9141],"class_list":["post-68081","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-9189","tag-helm-charts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.6 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Helm Chart\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8efd\u6e1bYAML | JFrog ChartCenter<\/title>\n<meta name=\"description\" content=\"\u5831\u544a\u3055\u308c\u305f\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u30e1\u30e2(\u201cMitigation note\u201d)\u3092JFrog ChartCenter\u306e\u7121\u6599\u306e\u4e2d\u592eHelm\u30ea\u30dd\u30b8\u30c8\u30ea\u306b\u767b\u9332\u3057\u3066\u3001\u516c\u958b\u3055\u308c\u3066\u3044\u308bHelm Chart\u3092\u5f37\u5316\u3057\u307e\u3057\u3087\u3046\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/68081\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ChartCenter\u306bHelm Chart\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8efd\u6e1b\u30e1\u30e2(Mitigation Notes)\u3092\u8ffd\u52a0\u3059\u308b\" \/>\n<meta property=\"og:description\" content=\"\u5831\u544a\u3055\u308c\u305f\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u30e1\u30e2(\u201cMitigation note\u201d)\u3092JFrog ChartCenter\u306e\u7121\u6599\u306e\u4e2d\u592eHelm\u30ea\u30dd\u30b8\u30c8\u30ea\u306b\u767b\u9332\u3057\u3066\u3001\u516c\u958b\u3055\u308c\u3066\u3044\u308bHelm Chart\u3092\u5f37\u5316\u3057\u307e\u3057\u3087\u3046\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/\" \/>\n<meta property=\"og:site_name\" content=\"JFrog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/artifrog\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-28T11:18:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-12T03:03:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/speedmedia.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/https:\/\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07172804\/203_148.png\" \/>\n\t<meta property=\"og:image:width\" content=\"204\" \/>\n\t<meta property=\"og:image:height\" content=\"149\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"yardenr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jfrog\" \/>\n<meta name=\"twitter:site\" content=\"@jfrog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"yardenr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/\"},\"author\":{\"name\":\"yardenr\",\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/person\/17b5a957427ef63e29b133865fbe38b5\"},\"headline\":\"ChartCenter\u306bHelm Chart\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8efd\u6e1b\u30e1\u30e2(Mitigation Notes)\u3092\u8ffd\u52a0\u3059\u308b\",\"datePublished\":\"2020-12-28T11:18:51+00:00\",\"dateModified\":\"2021-01-12T03:03:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/\"},\"wordCount\":231,\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/ja\/#organization\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07172804\/203_148.png\",\"keywords\":[\"helm charts\"],\"articleSection\":[\"\u30ab\u30c6\u30b4\u30ea\u30fc\u306a\u3057\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/\",\"url\":\"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/\",\"name\":\"Helm Chart\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8efd\u6e1bYAML | JFrog ChartCenter\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/ja\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07172804\/203_148.png\",\"datePublished\":\"2020-12-28T11:18:51+00:00\",\"dateModified\":\"2021-01-12T03:03:46+00:00\",\"description\":\"\u5831\u544a\u3055\u308c\u305f\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u30e1\u30e2(\u201cMitigation note\u201d)\u3092JFrog ChartCenter\u306e\u7121\u6599\u306e\u4e2d\u592eHelm\u30ea\u30dd\u30b8\u30c8\u30ea\u306b\u767b\u9332\u3057\u3066\u3001\u516c\u958b\u3055\u308c\u3066\u3044\u308bHelm Chart\u3092\u5f37\u5316\u3057\u307e\u3057\u3087\u3046\u3002\",\"breadcrumb\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/#primaryimage\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07172804\/203_148.png\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07172804\/203_148.png\",\"width\":204,\"height\":149},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jfrog.com\/ja\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ChartCenter\u306bHelm Chart\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8efd\u6e1b\u30e1\u30e2(Mitigation Notes)\u3092\u8ffd\u52a0\u3059\u308b\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jfrog.com\/ja\/#website\",\"url\":\"https:\/\/jfrog.com\/ja\/\",\"name\":\"JFrog\",\"description\":\"Deliver Trusted Software Releases at Speed and Scale\",\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/ja\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jfrog.com\/ja\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jfrog.com\/ja\/#organization\",\"name\":\"JFrog\",\"url\":\"https:\/\/jfrog.com\/ja\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"width\":74,\"height\":73,\"caption\":\"JFrog\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/artifrog\",\"https:\/\/x.com\/jfrog\",\"https:\/\/www.linkedin.com\/company\/455737\",\"https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg\",\"https:\/\/www.wikidata.org\/wiki\/Q98608948\"],\"description\":\"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.\",\"legalName\":\"Jfrog, Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/person\/17b5a957427ef63e29b133865fbe38b5\",\"name\":\"yardenr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1c782d13a43e902ae08f5ebccbf815ff26e829fd4472f78abea2d7f973d2c072?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1c782d13a43e902ae08f5ebccbf815ff26e829fd4472f78abea2d7f973d2c072?s=96&d=mm&r=g\",\"caption\":\"yardenr\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Helm Chart\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8efd\u6e1bYAML | JFrog ChartCenter","description":"\u5831\u544a\u3055\u308c\u305f\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u30e1\u30e2(\u201cMitigation note\u201d)\u3092JFrog ChartCenter\u306e\u7121\u6599\u306e\u4e2d\u592eHelm\u30ea\u30dd\u30b8\u30c8\u30ea\u306b\u767b\u9332\u3057\u3066\u3001\u516c\u958b\u3055\u308c\u3066\u3044\u308bHelm Chart\u3092\u5f37\u5316\u3057\u307e\u3057\u3087\u3046\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/68081","og_locale":"ja_JP","og_type":"article","og_title":"ChartCenter\u306bHelm Chart\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8efd\u6e1b\u30e1\u30e2(Mitigation Notes)\u3092\u8ffd\u52a0\u3059\u308b","og_description":"\u5831\u544a\u3055\u308c\u305f\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u30e1\u30e2(\u201cMitigation note\u201d)\u3092JFrog ChartCenter\u306e\u7121\u6599\u306e\u4e2d\u592eHelm\u30ea\u30dd\u30b8\u30c8\u30ea\u306b\u767b\u9332\u3057\u3066\u3001\u516c\u958b\u3055\u308c\u3066\u3044\u308bHelm Chart\u3092\u5f37\u5316\u3057\u307e\u3057\u3087\u3046\u3002","og_url":"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/","og_site_name":"JFrog","article_publisher":"https:\/\/www.facebook.com\/artifrog","article_published_time":"2020-12-28T11:18:51+00:00","article_modified_time":"2021-01-12T03:03:46+00:00","og_image":[{"width":204,"height":149,"url":"https:\/\/speedmedia.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/https:\/\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07172804\/203_148.png","type":"image\/png"}],"author":"yardenr","twitter_card":"summary_large_image","twitter_creator":"@jfrog","twitter_site":"@jfrog","twitter_misc":{"Written by":"yardenr","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/#article","isPartOf":{"@id":"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/"},"author":{"name":"yardenr","@id":"https:\/\/jfrog.com\/ja\/#\/schema\/person\/17b5a957427ef63e29b133865fbe38b5"},"headline":"ChartCenter\u306bHelm Chart\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8efd\u6e1b\u30e1\u30e2(Mitigation Notes)\u3092\u8ffd\u52a0\u3059\u308b","datePublished":"2020-12-28T11:18:51+00:00","dateModified":"2021-01-12T03:03:46+00:00","mainEntityOfPage":{"@id":"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/"},"wordCount":231,"publisher":{"@id":"https:\/\/jfrog.com\/ja\/#organization"},"image":{"@id":"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07172804\/203_148.png","keywords":["helm charts"],"articleSection":["\u30ab\u30c6\u30b4\u30ea\u30fc\u306a\u3057"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/","url":"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/","name":"Helm Chart\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8efd\u6e1bYAML | JFrog ChartCenter","isPartOf":{"@id":"https:\/\/jfrog.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/#primaryimage"},"image":{"@id":"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07172804\/203_148.png","datePublished":"2020-12-28T11:18:51+00:00","dateModified":"2021-01-12T03:03:46+00:00","description":"\u5831\u544a\u3055\u308c\u305f\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u30e1\u30e2(\u201cMitigation note\u201d)\u3092JFrog ChartCenter\u306e\u7121\u6599\u306e\u4e2d\u592eHelm\u30ea\u30dd\u30b8\u30c8\u30ea\u306b\u767b\u9332\u3057\u3066\u3001\u516c\u958b\u3055\u308c\u3066\u3044\u308bHelm Chart\u3092\u5f37\u5316\u3057\u307e\u3057\u3087\u3046\u3002","breadcrumb":{"@id":"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/#primaryimage","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07172804\/203_148.png","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2020\/12\/07172804\/203_148.png","width":204,"height":149},{"@type":"BreadcrumbList","@id":"https:\/\/jfrog.com\/ja\/blog\/adding-helm-chart-security-mitigation-notes-to-chartcenter-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jfrog.com\/ja\/"},{"@type":"ListItem","position":2,"name":"ChartCenter\u306bHelm Chart\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8efd\u6e1b\u30e1\u30e2(Mitigation Notes)\u3092\u8ffd\u52a0\u3059\u308b"}]},{"@type":"WebSite","@id":"https:\/\/jfrog.com\/ja\/#website","url":"https:\/\/jfrog.com\/ja\/","name":"JFrog","description":"Deliver Trusted Software Releases at Speed and Scale","publisher":{"@id":"https:\/\/jfrog.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jfrog.com\/ja\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/jfrog.com\/ja\/#organization","name":"JFrog","url":"https:\/\/jfrog.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/jfrog.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","width":74,"height":73,"caption":"JFrog"},"image":{"@id":"https:\/\/jfrog.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/artifrog","https:\/\/x.com\/jfrog","https:\/\/www.linkedin.com\/company\/455737","https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg","https:\/\/www.wikidata.org\/wiki\/Q98608948"],"description":"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.","legalName":"Jfrog, Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}},{"@type":"Person","@id":"https:\/\/jfrog.com\/ja\/#\/schema\/person\/17b5a957427ef63e29b133865fbe38b5","name":"yardenr","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/jfrog.com\/ja\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1c782d13a43e902ae08f5ebccbf815ff26e829fd4472f78abea2d7f973d2c072?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1c782d13a43e902ae08f5ebccbf815ff26e829fd4472f78abea2d7f973d2c072?s=96&d=mm&r=g","caption":"yardenr"}}]}},"_links":{"self":[{"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/68081","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/comments?post=68081"}],"version-history":[{"count":4,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/68081\/revisions"}],"predecessor-version":[{"id":68714,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/68081\/revisions\/68714"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/media\/67593"}],"wp:attachment":[{"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/media?parent=68081"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/categories?post=68081"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/tags?post=68081"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}