Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Assignment Proposal
Title
DevSecOps with Checkov for Infrastructure Security Scanning
Names and KTH ID
Deadline
Task 3
Category
Executable tutorial
Description
This executable tutorial demonstrates how to implement Infrastructure as Code (IaC) security scanning using Checkov, creating a DevSecOps workflow that prevents misconfigured infrastructure from reaching production.
The tutorial will guide users through scanning and securing Terraform infrastructure code using Checkov, an open-source static analysis tool that identifies security misconfigurations and compliance violations.
The tutorial will include:
Users will start with vulnerable AWS Terraform configurations, use Checkov to identify security issues, fix the vulnerabilities following security best practices, and finally show how to integrate automated security in CI/CD pipeline.
The tutorial will be delivered through KillerCoda platform in 4 steps: introduction to IaC security, Checkov scanning basics, vulnerability remediation, and CI/CD integration.
Relevance
This tutorial addresses a critical aspect of modern DevOps: infrastructure security integration throughout the development lifecycle. With 95% of cloud security breaches being preventable through proper configuration management, implementing IaC security scanning has become essential for DevOps teams. The approach demonstrates core DevOps principles of automation, continuous integration, and shift-left practices by catching security issues early in the infrastructure provisioning process rather than after deployment.
Deliverables