Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(docs): add markdown based documentation #28

Merged
merged 3 commits into from
Sep 9, 2024

Conversation

swarit-pandey
Copy link
Member

No description provided.

@swarit-pandey
Copy link
Member Author

We are yet to decide on which license to use for this github action.
cc: @nyrahul

README.md Outdated

To learn more about KubeArmor please visit, https://kubearmor.io/

We install KubeArmor in systemd mode in the GitHub runner and that lets us watch over
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
We install KubeArmor in systemd mode in the GitHub runner and that lets us watch over
This Action installs KubeArmor in systemd mode in the GitHub runner and watches over

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Addressed.

README.md Outdated
@@ -1,3 +1,190 @@
# report-action
# CI/CD Security by AccuKnox
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Monitor & Audit CI/CD pipelines

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Addressed.

Comment on lines +20 to +22
- Detect and prevent potential supply chain attacks in CI/CD environments
- Gain real-time visibility into your pipeline's security posture
- Streamline the integration of security practices into your DevOps workflow
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Detect and prevent potential supply chain attacks in CI/CD environments
- Gain real-time visibility into your pipeline's security posture
- Streamline the integration of security practices into your DevOps workflow
- Detect and prevent potential supply chain attacks in CI/CD environments
- Gain real-time visibility into your pipeline's security posture
- Streamline the integration of security practices into your DevOps workflow
Ensure application best practices by:
* Applying app hardening policies and checking whether it deviates during GH workflow execution.
* Identifying if there are any unknown processes spawning during CI/CD workflow execution.
* Identifying if any unwanted network connections are started in the pipeline.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Addressed.

Other than providing the baseline as an initial security posture, you can also write your
own security policies and have a more granular control on the CI/CD pipeline.

Here is an example of a security policy
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Remove the below YAML policy and provide a realistic policy from existing template

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added a more realistic policy.

README.md Outdated
For example:
![](./network_example_1.png)

<em>We will also support standard network policies in the coming realeases.</em>
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
<em>We will also support standard network policies in the coming realeases.</em>
<em>Support for network policies in the coming releases.</em>

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Addressed.

README.md Outdated
lines in your GitHub workflow and you are all set to go.

```yaml
- name: AccuKnox CI/CD scan
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- name: AccuKnox CI/CD scan
- name: AccuKnox CI/CD Monitor

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Addressed.

@swarit-pandey swarit-pandey merged commit 6d868e3 into accuknox:main Sep 9, 2024
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants