You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+31
Original file line number
Diff line number
Diff line change
@@ -500,6 +500,37 @@ The IAC static analysis can be done on configuration and code such as:
500
500
501
501
- Terraform: For deploying Cloud Infrastructure, it is the most commonly used form of IAC. As a result, there is an increased risk of introducing vulnerabilities into the cloud infrastructure. Keeping the infrastructure secure is crucial since it sits at the bottom of the application architecture.
502
502
503
+
#### Key traits of good security tooling chain.
504
+
505
+
- Easy to integrate with other tooling such as CICD pipeline, Monitoring tool, Repositories etc.
506
+
- Developer Adaptability and ease of use: The tool should be easy to use and can educate on CVE's identified.
507
+
- Less Noise and efficient mechanism to control it
508
+
- Vulnerability Database
509
+
- Relevancy to the solution we are developing
510
+
511
+
One name that stands out in meeting above criteria with almost all the desired feature is [Snyk](https://snyk.io/).
512
+
513
+
Snyk is Free to use and can be signed up using Github with below limitations for personal usage:
514
+
515
+
```
516
+
200 Open Source tests/month
517
+
100 Container tests/month
518
+
300 IaC tests/month
519
+
100 Code tests/month
520
+
```
521
+
522
+
Snyk has some really great features, such as:
523
+
524
+
- Native Github Integration allowing importing selective repositories or in bulk.
525
+
- Great User Interface for analyzing the scan outcome.
526
+
- Automated vulnerabilities fixes for dependencies, docker image etc through PR's.
527
+
- IDE Plugins
528
+
- Scheduled scans once a repository has been imported
529
+
- Ignoring a vulnerability for a definite time
530
+
- Snyk CLI
531
+
532
+
and the list can keep on going.
533
+
503
534
#### 5.4 Penetration Test
504
535
A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system. Not to be confused with a vulnerability assessment.
0 commit comments