DevSecOps
Integration of security practices into DevOps.
Contents
Tools
Dynamic Analysis
Imperva - Perform automated security scanning against an API based on an API specification.
Gauntlt - A Behaviour Driven Development framework to run security scans using common security tools and test output, defined using Gherkin syntax.
Spectral - Discover internet-wide misconfigurations, using zgrab2 and others.
Multi-Platform
Cloud Formation
Containers
Scan App Container and Docker containers for publicly disclosed vulnerabilities.
Compares OS and software dependency versions installed in Docker containers with public vulnerability databases, and also performs virus scanning.
The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.
Terraform
Kubernetes
Ansible
Intentionally Vulnerable Applications
The Chromium Project - A container running a number of webservers with poor SSL / TLS configuration. Useful for testing tooling.
Bridgecrew - Cloud Formation templates for creating stacks of intentionally insecure services in AWS. Ideal for testing the Cloud Formation Infrastructure as Code Analysis tools above.
Cider Security - A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
Madhu Akula - Intentionally vulnerable cluster environment to learn and practice Kubernetes security.
OWASP - A Node.js web application that demonstrates and provides ways to address common security vulnerabilities.
Secrets Management
Password manager for teams relying on Git and gpg. Manages secrets in encrypted files and repositories.
Keyscope is an open source key and secret workflow tool (validation, invalidation, etc.) built in Rust.
Secrets Scanning
Scans commits, commit messages and merges for secrets. Native support for AWS secret patterns, but can be configured to support other patterns.
An aptly named module for (surprise, surprise) detecting secrets within a code base.
Gitleaks is a SAST tool for detecting hardcoded secrets like passwords, api keys, and tokens in git repositories.
Multi-Language Support
C / C++
C#
Configuration Files
Java
Go
.NET
PHP
Python
Ruby
Supply Chain Security
StepSecurity - installs a security agent on the GitHub-hosted runner (Ubuntu VM) to prevent exfiltration of credentials, detect compromised dependencies and build tools, and detect tampering of source code during the build.
SCAR - a browser extension helping developers evaluate open source packages before picking them.
Spectral - helps you verify scripts and executables to mitigate supply chain attacks in your CI and other systems, such as in the recent Codecov hack.
sigstore is a set of free to use and open source tools, including fulcio, cosign and rekor, handling digital signing, verification and checks for provenance needed to make it safer to distribute and use open source software.
Anchore - A CLI tool for generating a Software Bill of Materials (SBOM) from container images and filesystems.
Related Lists
Practical DevSecOps - A curated list of threat modeling resources.
Matthias Endler - A collection of dynamic analysis tools and code quality checkers.