Skip to content

Commit 4671589

Browse files
committed
feat(#106): update README with snyk info
1 parent 0fd6c77 commit 4671589

File tree

1 file changed

+31
-0
lines changed

1 file changed

+31
-0
lines changed

README.md

+31
Original file line numberDiff line numberDiff line change
@@ -500,6 +500,37 @@ The IAC static analysis can be done on configuration and code such as:
500500
501501
- Terraform: For deploying Cloud Infrastructure, it is the most commonly used form of IAC. As a result, there is an increased risk of introducing vulnerabilities into the cloud infrastructure. Keeping the infrastructure secure is crucial since it sits at the bottom of the application architecture.
502502
503+
#### Key traits of good security tooling chain.
504+
505+
- Easy to integrate with other tooling such as CICD pipeline, Monitoring tool, Repositories etc.
506+
- Developer Adaptability and ease of use: The tool should be easy to use and can educate on CVE's identified.
507+
- Less Noise and efficient mechanism to control it
508+
- Vulnerability Database
509+
- Relevancy to the solution we are developing
510+
511+
One name that stands out in meeting above criteria with almost all the desired feature is [Snyk](https://snyk.io/).
512+
513+
Snyk is Free to use and can be signed up using Github with below limitations for personal usage:
514+
515+
```
516+
200 Open Source tests/month
517+
100 Container tests/month
518+
300 IaC tests/month
519+
100 Code tests/month
520+
```
521+
522+
Snyk has some really great features, such as:
523+
524+
- Native Github Integration allowing importing selective repositories or in bulk.
525+
- Great User Interface for analyzing the scan outcome.
526+
- Automated vulnerabilities fixes for dependencies, docker image etc through PR's.
527+
- IDE Plugins
528+
- Scheduled scans once a repository has been imported
529+
- Ignoring a vulnerability for a definite time
530+
- Snyk CLI
531+
532+
and the list can keep on going.
533+
503534
#### 5.4 Penetration Test
504535
A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system. Not to be confused with a vulnerability assessment.
505536

0 commit comments

Comments
 (0)