Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
NotificationsYou must be signed in to change notification settings

WizelineLabs/vulnerabilities-scanner-template

Repository files navigation

This an step by step workshop of how to implement Vulnerabilities Scanning in your code. Workshop steps areHERE

Infrastructure as a Code

  • stelligent/cfn_nag:

    • The cfn-nag tool looks for patterns in CloudFormation templates that may indicate insecure infrastructure. Roughly speaking, it will look for:
      • IAM rules that are too permissive (wildcards)
      • Security group rules that are too permissive (wildcards)
      • Access logs that aren't enabled
      • Encryption that isn't enabled
      • Password literals
  • bridgecrewio/checkov-action

    • This GitHub Action runsCheckov against an Infrastructure-as-Code repository. Checkov performs static security analysis of Terraform & CloudFormation Infrastructure code .

Security Scanning for Application Code

  • gitleaks

    • Gitleaks is a SAST tool for detecting and preventing hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks is an easy-to-use, all-in-one solution for detecting secrets, past or present, in your code.
  • Grype (Anchore) Project and Docker Scan

    • This is a GitHub Action for invoking theGrype scanner and returning the vulnerabilities found, and optionally fail if a vulnerability is found with a configurable severity level.
  • Pycharm-security check

    • The plugin looks at your Python code for common security vulnerabilities and suggests fixes.
  • Trivy Vulnerability Scanning

    • Trivy has different scanners that look for different security issues, and different targets where it can find those issues.

    • Targets:

      • Container Image
      • Filesystem
      • Git repository (remote)
      • Kubernetes cluster or resource
    • Scanners:

      • OS packages and software dependencies in use (SBOM)
      • Known vulnerabilities (CVEs)
      • IaC misconfigurations
      • Sensitive information and secrets

Workshop

In this workshop you are going to learn how to implement security and vulnerabilities scanning in your code by using already available Github Actions on your GA Workflows.The idea of this workshop is to follow the steps defined in this document at your own pace and using free tools.We will try to cover vulnerabilities scanning for the application code (a Python Lambda function) and for the Infrastructure as Code (Cloudformation, docker)

We are going to create two pipelines, one for the application code and one for the IaC:

  • The pipeline for the application code would look like:

  • The pipeline for the Infrastructure as Code would look like:

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors2

  •  
  •  

[8]ページ先頭

©2009-2025 Movatter.jp