Standalone Security Scanning workflow #1
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Standalone Security Scans
This change aims to help Dojo shifting security left by providing engineers with little to no configuration scans for SCA (Software Composition Analysis), Iac (Infrastructure as Code) and leaked secrets. To achieve that, we are relying on a tool called Wiz CLI that will run in parallel to the workflows already being run in the repository.
Please visit our notion page for more information on the Standalone Security Scans project or if you have any questions about the Application Security Tooling and what they do.
Have any questions? Please reach out to us on #application-security-tools on Slack.
What else needs to be done (by you)
standalone-security-scans.yml
with what's relevant to your tribe;Updating wiz-project-uuid
The first thing that needs to be done is to update the
project-uuid
attribute and replace theWIZ_PROJECT_UUID_REPLACE_ME
with a value that matches your tribe. To list the available project uuids, on your repo, first go to settings -> Secrets and variables -> Actions and then click on the Variables tab. There you can see a variable that will be relevant to your repository. Please reach out to us if you think there's anything missing or if you have any questions.Removing any traces of SNYK
Snyk is being deprecated so we must remove anything related to it, plain and simple. Since the Standalone Security Scans already provide SCA, IaC and Secret scanning, you can simply remove those from your workflows. Container scanning will be replaced with Wiz container scanning (more details on the next steps).
Container Scanning
NOTE: Don't worry about this if you are using the reusable workflows!
If you are deploying containers and have no container scanning already set up, we strongly suggest you to add it. Here's how the scanning STEP would look like in your workflow. NOTE: It goes without saying that we need the container built and available in the step prior to scanning.
More information here.
Updating reusable workflows
The first step is to remove anything related to Snyk from there since snyk is being replaced with Wiz. If you don't have anything, all that's left to do is to pass on the secrets and update the proper variables.
What happens next?
Congratulations, you now have Dojo's basic Application Security Tooling running on your repository. From now on, you should see a summary with the scan results posted as a comment on your PR and, if you need more information, you can go to the job itself for a complete list of the issues and a link to them in Wiz.
Of course we don't expect anyone to fix everything in one go, but having a little bit more visibility earlier in the development process helps speeding up these fixes.
Created by Sourcegraph batch change
Luis-Almeida/standalone-security-scans-payments-products
.