IaC Connectivity Risk Analysis

This topic describes how to set up and use AlgoSec’s IaC (Infrastructure-as-Code) Connectivity Risk Analysis.

The IaC Connectivity Risk Analysis is an extensible security plug in platform that checks code for potential vulnerabilities before being implemented on the cloud infrastructure. It accelerates application delivery by taking a proactive, preventive, and collaborative approach within your CI/CD pipeline.

Developers get a clear view of risks and receive clear remediation steps while working in the source control applications. This way they don’t need to move to different applications or wait for security admin to manually review and approve that the code is risk free to progress in their work.

The analysis runs each time a Pull Request (in GitHub) or Merge Request (in GitLab) is created. The analysis result appears in the comments. For example, one critical risk was found in the code in GitHub:

Expand the risk in the Detailed Risk report section to see information and remediation steps:

Integrations

The IaC Connectivity Risk Analysis integrates with the following:

Code repositories GitHub, GitLab
CI/CD systems GitHub Workflow, GitLab CI/CD
IaC providers Terraform
Cloud providers AWS, Azure, Google Cloud

Set up the IaC Connectivity Risk Analysis

For admin and advanced users

Work with the IaC Connectivity Risk Analysis action

For code developers

Once the IaC Connectivity Risk Analysis action is set up, it’s ready for use.

The following instructions explain how to use the IaC Connectivity Risk Analysis in your CI/CD workflow.