triat / Terraform Security Scan
Licence: mit
Run a security scan on your terraform with the very nice https://github.com/liamg/tfsec
Stars: ✭ 64
Programming Languages
shell
77523 projects
Projects that are alternatives of or similar to Terraform Security Scan
Tfsec
Security scanner for your Terraform code
Stars: ✭ 3,622 (+5559.38%)
Mutual labels: aws, azure, google-cloud-platform, static-analysis, hacktoberfest, terraform, scanner, compliance, ci
Checkov
Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework and other infrastructure-as-code-languages with Checkov by Bridgecrew.
Stars: ✭ 3,572 (+5481.25%)
Mutual labels: aws, azure, static-analysis, hacktoberfest, terraform, compliance
Horusec
Horusec is an open source tool that improves identification of vulnerabilities in your project with just one command.
Stars: ✭ 311 (+385.94%)
Mutual labels: static-analysis, hacktoberfest, terraform, scanner, ci
Terracognita
Reads from existing Cloud Providers (reverse Terraform) and generates your infrastructure as code on Terraform configuration
Stars: ✭ 452 (+606.25%)
Mutual labels: aws, azure, google-cloud-platform, terraform
Cfripper
Library and CLI tool for analysing CloudFormation templates and check them for security compliance.
Stars: ✭ 265 (+314.06%)
Mutual labels: aws, static-analysis, compliance
intercept
INTERCEPT / Policy as Code Static Analysis Auditing / SAST
Stars: ✭ 54 (-15.62%)
Mutual labels: scanner, static-analysis, compliance
Terraform Aws Gitlab Runner
Terraform module for AWS GitLab runners on ec2 (spot) instances
Stars: ✭ 292 (+356.25%)
Mutual labels: aws, terraform, ci
Docker Android
Android in docker solution with noVNC supported and video recording
Stars: ✭ 4,042 (+6215.63%)
Mutual labels: aws, azure, terraform
Terraform Kubestack
Terraform GitOps Framework — Everything you need to build reliable automation for AKS, EKS and GKE Kubernetes clusters in one free and open-source framework.
Stars: ✭ 300 (+368.75%)
Mutual labels: aws, azure, terraform
Cloud Custodian
Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources
Stars: ✭ 3,926 (+6034.38%)
Mutual labels: aws, azure, compliance
Offensive Terraform.github.io
Offensive Terraform Website
Stars: ✭ 25 (-60.94%)
Mutual labels: aws, azure, terraform
Cloud Portal
Self service web portal for different Cloud platforms like Azure, AWS and VMWare vSphere.
Stars: ✭ 60 (-6.25%)
Mutual labels: aws, azure, terraform
Infracost
Cloud cost estimates for Terraform in pull requests💰📉 Love your cloud bill!
Stars: ✭ 4,505 (+6939.06%)
Mutual labels: aws, terraform, azure
Engine
Deploy your apps on any Cloud provider in just a few seconds
Stars: ✭ 1,132 (+1668.75%)
Mutual labels: aws, azure, terraform
Iam Policy Json To Terraform
Small tool to convert an IAM Policy in JSON format into a Terraform aws_iam_policy_document
Stars: ✭ 282 (+340.63%)
Mutual labels: aws, hacktoberfest, terraform
Drone Cache
A Drone plugin for caching current workspace files between builds to reduce your build times
Stars: ✭ 194 (+203.13%)
Mutual labels: aws, azure, hacktoberfest
Devops Exercises
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
Stars: ✭ 20,905 (+32564.06%)
Mutual labels: aws, azure, terraform
Terratag
Terratag is a CLI tool that enables users of Terraform to automatically create and maintain tags across their entire set of AWS, Azure, and GCP resources
Stars: ✭ 385 (+501.56%)
Mutual labels: aws, azure, terraform
Cloudguardiaas
Check Point CloudGuard Network Security repository containing solution templates, Terraform templates, tools and scripts for deploying and configuring CloudGuard Network Security products.
Stars: ✭ 27 (-57.81%)
Mutual labels: aws, azure, terraform
Terraform security check action
This action runs https://github.com/tfsec/tfsec on $GITHUB_WORKSPACE
. This is a security check on your terraform repository.
The action requires the https://github.com/actions/checkout before to download the content of your repo inside the docker.
Inputs
-
tfsec_actions_comment
- (Optional) Whether or not to comment on GitHub pull requests. Defaults totrue
. -
tfsec_actions_working_dir
- (Optional) Terraform working directory location. Defaults to'.'
. -
tfsec_exclude
- (Optional) Provide checks via,
without space to exclude from run. No default -
tfsec_version
- (Optional) Specify the version of tfsec to install. Defaults to the latest
Outputs
None
Example usage
steps:
- uses: actions/[email protected]
- uses: triat/[email protected]
The above example uses a tagged version (v1
), you can also opt to use any of the released version.
To allow the action to add a comment to a PR when it fails you need to append the GITHUB_TOKEN
variable to the tfsec action:
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
Full example:
jobs:
tfsec:
name: tfsec
runs-on: ubuntu-latest
steps:
- name: Checkout
uses: actions/[email protected]
- name: Terraform security scan
uses: triat/[email protected]
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].