Skip to content

A continuous security pipeline demo for the AWS DevSecOps Workshop.

Notifications You must be signed in to change notification settings

IDDevOps/aws-devsecops-workshop

 
 

Repository files navigation

aws-devsecops-workshop

A continuous security pipeline demo for the AWS DevSecOps Workshop.

Prerequisites

Before you get started, there are a few things you will to need to prepare.

AWS Account

We recommend using a new AWS account for the workshop environment. You can also use an existing account, but make sure the account has no existing resources created. Some of the security checks executed by this workshop may discover resources that are not configured to best practices and fail your pipeline.

AWS CLI

Install the aws-cli and use aws configure to set your AWS Access Keys for your development environment (the account specified above).

Jenkins Configuration

  • Jenkins is bootstrapped via an Ansible Playbook executed in CFN cloud-init.
  • Ansible Playbook expects latest Amazon Linux AMI.
  • Jenkins auto-generated initial password is made permanent.
  • Jenkins admin username/password are written to SSM ParameterStore.
  • The following SSM Keys are populated:
/DevSecOps/jenkins_ip
/DevSecOps/jenkins_user
/DevSecOps/jenkins_password

Pipeline Stages

  • Commit

    1. cfn_nag
    2. rubocop
    3. unit tests
  • Acceptance

    1. create environment
    • cloudformation
    1. infrastructure tests
    2. integration tests
    • serverspec
    • cucumber
    1. security environment tests
    • aws configservice
    • aws inspector
  • Capacity

    1. security penetration tests
    • owasp zap
    1. capactity tests
    • apache benchmark
  • Deployment

    1. production deploy
    2. smoke tests
    • cucumber

Create Workshop Environment

  • One-button launch of the workshop environment: ./deploy.sh
  • TRUSTED_CIDR is expected to be exported in the environment (example: "export TRUSTED_CIDR=100.20.30.45/32")
  • Variables at the top of deploy.sh may need to be customized.

Egress Rules

TODO: Lockdown outgoing traffic

  • prevent exfiltration with egress rules
  • Github, RubyGems, and AWS API Endpoints only traffic allowed out

About

A continuous security pipeline demo for the AWS DevSecOps Workshop.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Ruby 78.5%
  • Shell 10.6%
  • Python 7.3%
  • Gherkin 2.4%
  • Groovy 1.2%