DevSecOps pipeline with SAST/SCA/DAST integrations
Why Choose This Project
Security can’t be an afterthought. Modern teams need to shift left—finding vulnerabilities before production. This project embeds security checks at every stage of the SDLC using SAST (code), SCA (dependencies), and DAST (runtime), creating a repeatable, automated DevSecOps pipeline that reduces risk, speeds releases, and improves compliance.
What You Get
-
End-to-end CI/CD pipeline with integrated security scanning.
-
Automatic gating (fail builds) on high-severity findings.
-
Centralized vulnerability reports and trend dashboards.
-
Policy-as-code to enforce standards across repos/environments.
-
Templates to apply across multiple services/teams.
Key Features
| Feature | Description |
|---|---|
| SAST (Static Analysis) | Scans source code for insecure patterns, secrets, and misconfigurations pre-build. |
| SCA (Software Composition Analysis) | Identifies vulnerable 3rd-party libraries/containers and suggests fixed versions. |
| DAST (Dynamic Testing) | Black-box tests running app in staging; finds auth, input validation & OWASP Top 10 issues. |
| Secrets Detection | Blocks commits with credentials/tokens via pre-commit & pipeline checks. |
| IaC Scanning | Terraform/K8s/CloudFormation policy checks to prevent misconfigurations. |
| Policy Gates | Fails pipeline on high/critical CVEs or policy violations; supports waivers/SLAs. |
| SBOM Generation | Creates Software Bill of Materials for provenance & compliance. |
| Auto-Create Tickets | Opens Jira/GitHub issues with remediation guidance. |
Technology Stack
CI/CD Orchestrators (choose one):
-
GitHub Actions / GitLab CI / Jenkins / Azure DevOps
Security Tools (examples; swap with equivalents as needed):
-
SAST: Semgrep, SonarQube, Checkmarx, CodeQL
-
SCA: OWASP Dependency-Check, Snyk, Trivy, Renovate (auto PRs)
-
DAST: OWASP ZAP, Burp Suite (CI mode)
-
Secrets: Gitleaks, TruffleHog
-
IaC: Checkov, tfsec, Kics, Conftest (OPA)
-
Containers: Trivy/Grype for image scanning
Infrastructure & Packaging:
-
Docker, Kubernetes (EKS/GKE/AKS) optional staging env
-
Artifact registry (GitHub Packages / ECR / ACR / GCR)
Observability & Reporting:
-
DefectDojo / SonarQube dashboards / ELK / Grafana
Cloud Services Used (examples)
-
AWS: ECR (images), CodeArtifact (optional), CloudWatch, Security Hub aggregation
-
Azure: ACR, Azure Monitor, Defender for Cloud integration
-
GCP: Artifact Registry, Cloud Logging, Security Command Center
Working Flow
-
Code Commit & PR
-
Pre-commit hooks run secrets scan & format/lint locally.
-
On PR, CI triggers SAST + SCA + IaC scans.
-
-
Build & Containerize
-
Build artifact/image; run image SCA (Trivy/Grype).
-
Generate SBOM (CycloneDX/Syft) and attach to artifact.
-
-
Deploy to Staging
-
Spin up ephemeral/staging env (K8s or Docker Compose).
-
Run DAST (OWASP ZAP baseline/active scan) against live endpoint.
-
-
Policy Gates & Governance
-
Pipeline enforces thresholds (e.g., no Critical/High).
-
Violations fail the job; waivers require approval & expiry.
-
-
Reporting & Tickets
-
Findings pushed to central dashboard & issue tracker (Jira/GitHub).
-
Notifications to Slack/Teams with summaries & remediation links.
-
-
Release to Prod
-
If gates pass, promote artifact via CD; attach SBOM & attestation.
-
Optional post-deploy smoke & runtime checks.
-
Main Modules
-
Pre-commit & PR Security – Secrets + SAST baseline.
-
Build & SCA Module – Dependency & container image scanning + SBOM.
-
IaC Policy Module – Terraform/K8s policy checks with OPA/Checkov.
-
DAST Module – Active/baseline scans against staging URLs.
-
Policy Gatekeeper – Central threshold config & exceptions workflow.
-
Reporting & Ticketing – Dashboards, alerts, auto issue creation.
-
Compliance & Audit – Evidence store, scan artifacts, SARIF reports.
Security Features
-
Least-privilege CI credentials and short-lived tokens.
-
Signed artifacts (Sigstore/Cosign) and provenance attestations.
-
SBOMs per build for traceability and supply-chain security.
-
Encrypted secrets via Vault/Secrets Manager and masked in logs.
-
Role-based access to dashboards and vulnerability data.