Difference between revisions of "Keeping Infrastructure as Code Secure (KICS)"
Jump to navigation
Jump to search
Line 21: | Line 21: | ||
* [[Checkmarx]] | * [[Checkmarx]] | ||
* [[KICS execution example]] | * [[KICS execution example]] | ||
− | * [[Hardeneks]] | + | * [[Hardeneks]]: <code>[[hardeneks]]</code> |
== See also == | == See also == |
Latest revision as of 18:58, 27 February 2024
Scan a directory:
docker run -t -v {path_to_host_folder_to_scan}:/path checkmarx/kics:latest scan -p /path -o "/path/"
Scan a single file:
docker run -t -v {path_to_host_folder}:/path checkmarx/kics:latest scan -p /path/{filename}.{extension} -o "/path/"
uses: checkmarx/kics-github-action
- Integrated with GitLab 14.5 (2022)
- GitHub
- Checkmarx
- KICS execution example
- Hardeneks:
hardeneks
See also[edit]
kics [ scan | analyze | --help ]
- Keeping Infrastructure as Code Secure (KICS), execution example
- IaC: Terraform, Chef, cdist, capistrano, Harrow, puppet, Ansible, CFEngine, Cloud Deployment Manager, pulumi, juju, SaltStack, Azure Resource Manager (ARM), Google Deployment Manager, AWS CloudFormation, Pulumi, Heat, Spacelift, Oracle Cloud Resource Manager, KICS, Troposphere, CaC, IaC scanning
Advertising: