Ability to Detect or Restrict Custom Docker Images in Runners

We’d love to see functionality in Spacelift that allows admins to detect or restrict the use of custom Docker images when running Terraform (or any command) via stacks. This would prevent the use of unverified images that could lead to secret leakage or execution of malicious logic.

Workaround
-
Problem
Restricting image sources helps ensure trusted environments are used for all deployments and aligns with best practices for securing CI/CD pipelines. Ideally, organisations should be able to whitelist approved images or enforce base image standards across all stacks.

Please authenticate to join the conversation.

Upvoters
Status

🗑️ Archived

Board

💡 Feature Requests

Date

10 months ago

Subscribe to post

Get notified by email when there are changes.