What We Detect
Misconfigurations
Publicly exposed databases and storage buckets
Compliance Violations
CIS benchmarks and security best practices
Privilege Escalation
Overly permissive IAM roles
Resource Exposure
Unencrypted data and open ports
Supported Infrastructure
Cloud Platforms
- AWS: CloudFormation, CDK, IAM policies, Security groups, S3 buckets
- Azure: ARM templates, Bicep, Network security groups, Storage accounts
- GCP: Deployment Manager, IAM policies, Firewall rules, Cloud Storage
IaC Tools
- Terraform: HCL files and modules
- Kubernetes: YAML manifests and Helm charts
- Docker: Dockerfiles and compose files
- Ansible: Playbooks and roles
- CloudFormation: JSON and YAML templates
- Pulumi: TypeScript, Python, Go
Common Vulnerabilities
Public Storage Buckets
Unrestricted Security Groups
Kubernetes Security
Compliance Frameworks
CIS Benchmarks
AWS, Azure, GCP, Kubernetes
PCI DSS
Payment card industry standards
HIPAA
Healthcare data protection
SOC 2
Service organization controls
Container Image Scanning
Scan Docker images for vulnerabilities in base images and dependencies.- OS vulnerabilities in base images
- Application CVEs in dependencies
- Secrets in image layers
- Dockerfile best practices
Configuration
Configure IaC scanning in repository settings:- Enable/disable IaC scanning
- Select frameworks to scan
- Set severity thresholds
- Configure compliance frameworks
- Enable drift detection
Best Practices
- Scan IaC files in CI/CD before deployment
- Use policy as code for compliance
- Monitor configuration drift
- Keep base images updated
- Automate remediation for common issues
