Skip to content

How to build up an enterprise-ready DevSecOps Pipeline with GitHub Resources

Notifications You must be signed in to change notification settings

adavarski/DevSecOps-GitHub-Actions-java-app

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

How to build a DevSecOps Pipeline in GitHub

This repository shows you how to build up an enterprise-ready DevSecOps Pipeline with GitHub.

Note: For GitHub Actions to work (OWASP) --> repo "Settings" -> Actions -> General -> Workflow permissions : V Read and write permissions.

Ref: https://docs.github.com/en/actions/using-jobs/assigning-permissions-to-jobs && https://arinco.com.au/blog/changes-to-the-default-github_token-permissions/

GitHub Actions Used

Step Github Action Comments Open Source Alternative
SCA: Software Composition Analysis (Dependency Checker) CDRA OWASP Dependency Check
Container Scan Trivy
DAST: Dynamic Application Security Testing OWASP ZAP Basline Scan
License Checker License finder

SCA Scan with CRDA:

SCA (Software Composition Analysis): check external dependencies/libraries used by the project have no known vulnerabilities. Third-party dependency scanning with CRDA.

Ref: https://github.com/redhat-actions/crda

Container Image Scanning with Trivy:

Identify vulnerabilities in built images -> Trivy Image Scanner

Ref: https://github.com/aquasecurity/trivy-action

DAST Scan with OWASP ZAP Scan

DAST: Dynamic Application Security Testing

OWASP (Open Web Application Security Project) ZAP (Zed Attack Proxy)

Ref: https://github.com/zaproxy/action-baseline

Ref: https://github.com/zaproxy/action-full-scan

License Compliance Scan

Ref: https://github.com/jmservera/license-finder-action && https://github.com/pivotal/LicenseFinder

How to analyze scan reports (json & serif report files)

Ref: https://docs.github.com/en/code-security/code-scanning/integrating-with-code-scanning/sarif-support-for-code-scanning

https://www.defectdojo.org

Note: https://github.com/alexgracianoarj/gitlab-pipeline-demo/blob/main/.gitlab-ci.yml -> example python script to upload scan results to defectdojo to analyze scan reports (json & serif report files)

GH Actions References:

https://github.com/actions

https://github.com/marketplace?type=actions

Syntax:

https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions

About

How to build up an enterprise-ready DevSecOps Pipeline with GitHub Resources

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages