Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
KICS stands for Keeping Infrastructure as Code Secure, it is open source and is a must-have for any cloud native project.
|
|
|
|
|
|
|
|
|
|
|
|
By default, Databricks, NIFCloud, and TencentCloud queries run when you scan Terraform files using KICS.
The Severity
and Description
of these queries are still under review.
Setting up and using KICS is super-easy.
- First, see how to install and get KICS running.
- Then explore KICS output results format and quickly fix the issues detected.
Interested in more advanced stuff?
See KICS documentation for more details and topics.
What makes KICS really powerful and popular is its built-in extensibility. This extensibility is achieved by:
- Fully customizable and adjustable heuristics rules, called queries. These can be easily edited, extended and added.
- Robust but yet simple architecture, which allows quick addition of support for new Infrastructure as Code solutions.
You're welcome to join our community, talk with us on GitHub discussions or contact KICS core team at [email protected].
See our individual contributors in the community page. You're welcome to join them by contributing to KICS.
We also like to thank the following organizations for their ongoing contribution:
- Checkmarx
- Bedrock Streaming (since v1.4.8)
- Dynatrace (since v1.5.1)
- Orca Security (since v1.5.10)
KICS is used by various companies and organizations, some are listed below. If you would like to be included here please open a PR.
- Checkmarx (IaC Security)
- GitLab (Infrastructure as Code scanning)
- Bedrock Streaming
- Cisco (CI/CD Securitry)
- Orca Security
- JIT (SAST for IaC)
- Firefly (Firefly Integrates With Checkmarx's KICS)
- Redpanda
- Keptn / Keptn Lifecycle Toolkit
Keeping Infrastructure as Code Secure!
© 2024 Checkmarx Ltd. All Rights Reserved.