The security scans are conducted on cloud resources after deployment in the current continuous integration and continuous deployment (CICD) environment. As a result, you secure your cloud resources post-deployment to respective Cloud accounts.
With an introduction of the Infrastructure as Code (IaC) security feature by Qualys TotalCloud, you can now secure your IaC templates before the cloud resources are deployed in your cloud environments. The IaC Security feature helps you shift cloud security and compliance posture to the left, allowing evaluation of cloud resources for misconfigurations much earlier during the development phase.
TotalCloud offers an integration with GitHub to secure Git repositories using GitHub actions that can be used to scan your IaC templates from GitHub repositories. It continuously verifies security misconfigurations against TotalCloud security controls and displays the misconfigurations for each run. You have continuous visibility of the security posture of your IaC Templates at GitHub repositories and plan for remediation. Follow this guide for more details.
For supported templates, other integrations, and features of Cloud IaC Security, refer to TotalCloud Online Help and TotalCloud API User Guide.
The GitHub integration allows you to perform IaC scans on the pull and push requests at the GitHub repositories. We provide you with a GitHub actions template and options that can be configured to run based on various triggers.
You can perform IaC scan on either of the following:
The results within GitHub provide you with proactive visibility into the Cloud security by scanning the templates residing in GitHub repositories.
Following are the pre-requisites for scanning IaC templates at GitHub;
Next step:
Configure Environment Variables