You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -101,23 +121,24 @@ We can't just do security in production after everything is built, we need to go
101
121
Each of these tools does similar things and are SAST (Static Analysis Security Tooling).
102
122
With Terraform you can analyze in a few ways.
103
123
104
-
1)hcl files
105
-
1)hcl files after interpolation and parsing
124
+
1)HCL files
125
+
1)Terraform Plan
106
126
107
127
---
108
128
109
129
# Rule customization
110
130
111
-
-ignoring rules
112
-
-overriding rules
113
-
-adding custom rules
131
+
-Ignoring rules
132
+
-Overriding rules
133
+
-Add custom rules
114
134
115
135
---
116
136
117
137
# Security Tooling - OSS
118
138
119
139
<divclass="columns">
120
140
<div>
141
+
<br />
121
142
There are many open-source tools as well as commercial solutions. We can integrate these tools in our local environments as well as our pipelines to secure things earlier.
122
143
</div>
123
144
<div>
@@ -137,32 +158,55 @@ There are many open-source tools as well as commercial solutions. We can integra
137
158
138
159
# tfsec
139
160
140
-
tfsec is a static analysis security scanner for your Terraform code.
161
+
tfsec is a static analysis security scanner for your Terraform code supported by Aquasecurity.
141
162
142
-
Designed to run locally and in your CI pipelines, developer-friendly output and fully documented checks mean detection and remediation can take place as quickly and efficiently as possible
163
+
Designed to run locally and in your CI pipelines, developer-friendly output and fully documented checks.
143
164
144
-

165
+
- OPA/Rego Policies
166
+
- VS Code Extension
167
+
- GitHub Actions
168
+
169
+

145
170
146
171
---
147
172
148
173
# Terrascan
149
174
150
-
Terrascan allows us to automate the compliance and security scans against a pre-defined set of policies or custom policies as part of the CI process.
175
+
Terrascan has support for Terraform, Azure, GCP, AWS, Kubernetes (manifests, Helm, Kustomize), Docker and even GitHub. Supported by Tenable and now integrated into nessus.
176
+
177
+
Terrascan has a large number of built in policies as well as support for custom OPA/Rego Policies.
151
178
152
-
It has support for Terraform, Azure, GCP, AWS, Kubernetes (manifests, Helm, Kustomize).
179
+

153
180
154
181
---
155
182
156
183
# Checkov
157
184
158
185
Checkov is another tool that lets us do scanning and compliance.
159
186
187
+
Checkov is by BridgeCrew and python based. Checkov, like terrascan, supports Terraform, Azure, GCP, AWS, Kubernetes (manifests, Helm, Kustomize) and Docker.
188
+
189
+

190
+
191
+
---
192
+
193
+
# Bonus Tool - Terraform Compliance
194
+
195
+
https://terraform-compliance.com/
196
+
197
+
BDD and Cucumber testing!
198
+
199
+

200
+
160
201
---
161
202
162
203
# Using Multiple Tools
163
204
164
-
Because these tools are independent and all scan the raw HCL or interpreted HCL, you can get different rules and better compliance.
205
+
## Defense in Depth
165
206
207
+
Because these tools are independent and all scan the raw HCL or interpreted HCL, you can get different rules and potentially better compliance.
208
+
209
+
You can also hit a Signal to Noise problem.
166
210
167
211
---
168
212
@@ -180,36 +224,51 @@ Because these tools are independent and all scan the raw HCL or interpreted HCL,
180
224
Pre-commit Hooks run before code gets committed to a git repo.
181
225
You do it yourself or use the precommit framework.
0 commit comments