Work in Progress
Repository for showing a Secure Software Development Lifecyle
- Build Container Image and push to Amazon Elastic Container Registry (ECR)
- Build Amazon Elastic Compute Cloud (EC2) Instance with webserver (from html/index.html) via script at launch and deploy using Terraform Cloud
- Build EKS Cluster with Amazon Elastic Kubernetes Service (EKS)
- Deploy Conatiner Image within Amazon Elastic Container Service (ECS)
- Docker (Code)
- Terraform (IaC)
- GitHub (VCS)
- GitHub Actions (CI)
- Terraform Cloud (CD)
- Amazon Elastic Container Registry (ECR)
- Amazon Elastic Compute Cloud (Amazon EC2)
- Amazon Elastic Container Service (ECS)
List of Security Functions provided by Prisma Cloud
- IaC & SCA Scanning with Checkov via IDE Plugin
- IaC Tagging with Yor via GitHub Action @ Pull Request
- Image Scanning with Twistcli via GitHub Action @ Pull Request
- IaC & SCA Scanning with Checkov via GitHub Action @ Push to Main Branch
- IaC & SCA Scanning with Prisma Cloud via Integration @ Push to Main Branch
- Image Scanning with Twistcli via GitHub Action @ Push to Main Branch
- IaC Scanning with Prisma Cloud via Terraform Run Task during Terraform Plan
- IaC Scanning with Prisma Cloud via Terraform Run Task during Terraform Apply
- Scanning Images in Container Image Registry via Prisma Cloud
- Scanning for CI/CD Risk within Development Pipelines
- Continuous Scanning of Configurations in AWS environment
- Continuous Workload Vulnerability Scanning of cloud workloads
- Ensure repository is public or part of GitHub Enterprise for GitHub Code Security Integration
- Configure GitHub Actions to allow for Write Permissions (Settings->Actions->General->Under "Workflow permissions"->Enable "Read and Write Permissions")
- Configure GitHub Action Secret -
AWS_ACCESS_KEY_ID
andAWS_SECRET_ACCESS_KEY
- Configure GitHub Action Variables -
AWS_ECR_REPOSITORY
andAWS_REGION
- Configure Workspace to allow for "Auto apply" for Apply Method
- Configure GitHub Action Secret -
TF_API_TOKEN
- Configure GitHub Action Variables -
TERRAFORM_CLOUD_WORKSPACE
andTERRAFORM_CLOUD_ORG
- Information for GitHubAction for IaC Tagging - yor-action
- Configure GitHub Action Secret for Checkov IaC Scan Scanning
& Checkov Image Scanning-BC_API_KEY
- Configure GitHub Action Variables -
PRISMA_API_URL
- Configure GitHub Action Secret for twistcli Image Scanning -
PCC_CONSOLE_URL
,PCC_PASS
andPCC_USER
- Install Terraform
- Automate Terraform with GitHub Actions
- Docker Docs - Containerizing an Application
- Github Action to AWS ECR (Docker Image) | Full Hands-on Tutorial
- How Prisma Cloud Secures Cloud Native App Development with DevOps Plugins
- Automated Container Image Scanning with the Prisma Cloud GitHub Action
- How to Deploy a Dockerised Application on AWS ECS With Terraform
- Bridgecrew Workshop - Yor Tag & Trace
- Create and manage an AWS ECS cluster with Terraform
- Terraform AWS Provider
- Terraform Cloud Workflows for GitHub
- Terraform AWS modules
- Create Amazon EKS Cluster using Terraform Module
- Provision and EKS cluster (AWS)
- How to create Docker Images with a Dockerfile on Ubuntu 22.04 LTS
- Kubernetes Provider for Terraform
- Deployment of Kubernetes, Helm and YAML files using Terraform
- https://github.com/twistlock/sample-code/blob/master/CI/GitHub/.github/workflows/scan.yml
- https://github.com/jcallowaypanw/cloud-security-aws-environement
- https://github.com/try-panwiac/vulnerable-front-end
- Build Container Image and push to Amazon Elastic Container Registry (ECR) with Image Scanning
- Build Amazon Elastic Compute Cloud (EC2) Instance with webserver via script at launch and deploy using Terraform Cloud with Yor Tagging & Checkov Scanning
- Increase Runtime Security with auto deploy of Prisma Cloud Defender on Host and Container Clusters
- Look into Trusted Images within Prisma Cloud
- Enablie twistcli scan to SARIF https://github.com/NJannasch/twistcli-sarif
- Look into Deploy infrastructure with Terraform and CircleCI
- Look into Deploy Consul and Vault on Kubernetes with run triggers
- Look to retrieve Terrform Apply Output and add to workflow in some manner
- Add additional resources within main.tf or expand to a more complex environment
- Add Traffic https://github.com/TheScriptGuy/generate-url-requests-docker
- Defend ECS Cluster [https://live.paloaltonetworks.com/t5/prisma-cloud-videos/defend-aws-ecs-cluster-with-prisma-cloud-compute/ta-p/529649]
- More Terraform Templates https://github.com/pfertyk/terraform-templates
- Remove Tags from IaC Templates
- Destroy Environment via Terraform Cloud
/end