All Projects → triat → Terraform Security Scan

triat / Terraform Security Scan

Licence: mit
Run a security scan on your terraform with the very nice https://github.com/liamg/tfsec

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Terraform Security Scan

Tfsec
Security scanner for your Terraform code
Stars: ✭ 3,622 (+5559.38%)
Mutual labels:  aws, azure, google-cloud-platform, static-analysis, hacktoberfest, terraform, scanner, compliance, ci
Checkov
Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework and other infrastructure-as-code-languages with Checkov by Bridgecrew.
Stars: ✭ 3,572 (+5481.25%)
Mutual labels:  aws, azure, static-analysis, hacktoberfest, terraform, compliance
Horusec
Horusec is an open source tool that improves identification of vulnerabilities in your project with just one command.
Stars: ✭ 311 (+385.94%)
Mutual labels:  static-analysis, hacktoberfest, terraform, scanner, ci
Terracognita
Reads from existing Cloud Providers (reverse Terraform) and generates your infrastructure as code on Terraform configuration
Stars: ✭ 452 (+606.25%)
Mutual labels:  aws, azure, google-cloud-platform, terraform
Cfripper
Library and CLI tool for analysing CloudFormation templates and check them for security compliance.
Stars: ✭ 265 (+314.06%)
Mutual labels:  aws, static-analysis, compliance
intercept
INTERCEPT / Policy as Code Static Analysis Auditing / SAST
Stars: ✭ 54 (-15.62%)
Mutual labels:  scanner, static-analysis, compliance
Terraform Aws Gitlab Runner
Terraform module for AWS GitLab runners on ec2 (spot) instances
Stars: ✭ 292 (+356.25%)
Mutual labels:  aws, terraform, ci
Docker Android
Android in docker solution with noVNC supported and video recording
Stars: ✭ 4,042 (+6215.63%)
Mutual labels:  aws, azure, terraform
Terraform Kubestack
Terraform GitOps Framework — Everything you need to build reliable automation for AKS, EKS and GKE Kubernetes clusters in one free and open-source framework.
Stars: ✭ 300 (+368.75%)
Mutual labels:  aws, azure, terraform
Cloud Custodian
Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources
Stars: ✭ 3,926 (+6034.38%)
Mutual labels:  aws, azure, compliance
Offensive Terraform.github.io
Offensive Terraform Website
Stars: ✭ 25 (-60.94%)
Mutual labels:  aws, azure, terraform
Cloud Portal
Self service web portal for different Cloud platforms like Azure, AWS and VMWare vSphere.
Stars: ✭ 60 (-6.25%)
Mutual labels:  aws, azure, terraform
Infracost
Cloud cost estimates for Terraform in pull requests💰📉 Love your cloud bill!
Stars: ✭ 4,505 (+6939.06%)
Mutual labels:  aws, terraform, azure
Engine
Deploy your apps on any Cloud provider in just a few seconds
Stars: ✭ 1,132 (+1668.75%)
Mutual labels:  aws, azure, terraform
Iam Policy Json To Terraform
Small tool to convert an IAM Policy in JSON format into a Terraform aws_iam_policy_document
Stars: ✭ 282 (+340.63%)
Mutual labels:  aws, hacktoberfest, terraform
Azure arc
Automated Azure Arc environments
Stars: ✭ 224 (+250%)
Mutual labels:  aws, azure, terraform
Drone Cache
A Drone plugin for caching current workspace files between builds to reduce your build times
Stars: ✭ 194 (+203.13%)
Mutual labels:  aws, azure, hacktoberfest
Devops Exercises
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
Stars: ✭ 20,905 (+32564.06%)
Mutual labels:  aws, azure, terraform
Terratag
Terratag is a CLI tool that enables users of Terraform to automatically create and maintain tags across their entire set of AWS, Azure, and GCP resources
Stars: ✭ 385 (+501.56%)
Mutual labels:  aws, azure, terraform
Cloudguardiaas
Check Point CloudGuard Network Security repository containing solution templates, Terraform templates, tools and scripts for deploying and configuring CloudGuard Network Security products.
Stars: ✭ 27 (-57.81%)
Mutual labels:  aws, azure, terraform

Master CI

Terraform security check action

This action runs https://github.com/tfsec/tfsec on $GITHUB_WORKSPACE. This is a security check on your terraform repository.

The action requires the https://github.com/actions/checkout before to download the content of your repo inside the docker.

Inputs

  • tfsec_actions_comment - (Optional) Whether or not to comment on GitHub pull requests. Defaults to true.
  • tfsec_actions_working_dir - (Optional) Terraform working directory location. Defaults to '.'.
  • tfsec_exclude - (Optional) Provide checks via , without space to exclude from run. No default
  • tfsec_version - (Optional) Specify the version of tfsec to install. Defaults to the latest

Outputs

None

Example usage

steps:
  - uses: actions/[email protected]
  - uses: triat/[email protected]

The above example uses a tagged version (v1), you can also opt to use any of the released version.

To allow the action to add a comment to a PR when it fails you need to append the GITHUB_TOKEN variable to the tfsec action:

  env:
    GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}

Full example:

jobs:
  tfsec:
    name: tfsec
    runs-on: ubuntu-latest
    steps:
      - name: Checkout
        uses: actions/[email protected]
      - name: Terraform security scan
        uses: triat/[email protected]
        env:
          GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].