Skip to content

Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.

License

Notifications You must be signed in to change notification settings

botmantra-admin/kics

Repository files navigation

Checkmarx Infrastructure as Code Scanning Engine (ICE)

ICE is a infrastructure-as-code Engine that scans infrastructure provisioned using Terraform.

ICE identifies security vulnerabilties and misconfigurations that may expose IaC files owners to cyber attacks.

ICE also powers Checkmarx SAST product, the security-first platform that streamlines code security throughout DevSecOps lifecycle.

Table of contents

Features

  • ICE scans terraform files and leverages over 40 built-in queries that cover security and compliance best practices for AWS, Azure and Google Cloud.

  • ICE users can create their own customer queries to support specific use-cases and prevent unique attack scenarios.

  • ICE Output is currently available as CLI, JSON and references to remediation guides.

Installation

This section describes installation procedure of ICE.

To have a fully working environment to use and develop in ICE you will need:

  1. Download and install Go: https://golang.org/dl/
  2. Install VS Code (or another IDE of your choosing): https://code.visualstudio.com/Download
  3. Inside VS Code, install the following extensions:
  • Go
  • Open Policy Agent
  • Git Lens
  1. Install PostgreSQL: https://www.postgresql.org/download/ (optional, not needed for CLI usage)
  2. Clone the repository of ICE to VS Code: https://github.com/CheckmarxDev/ice
  3. Test if the application is running properly by running in the terminal, in the root of the project:

go run ./cmd/console/main.go -p assets/queries/terraform

Contributing

Contribution is welcome and appreciated!!

Start by reviewing the contribution guidelines

Looking to contribute new scanning queries? Learn how to do it here

About

Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Open Policy Agent 47.1%
  • HCL 26.0%
  • Go 22.8%
  • HTML 3.1%
  • Dockerfile 0.8%
  • Makefile 0.1%
  • Other 0.1%