Skip to content

Instantly share code, notes, and snippets.

View SecureLayer's full-sized avatar
🎯

SecureLayer SecureLayer

🎯
View GitHub Profile
@SecureLayer
SecureLayer / Secrets_Scanning_Checklist.md
Last active November 23, 2024 04:58
Secrets Scanning Checklist

Scans Both Application Code and Infrastructure as Code Files

• Scans for secrets in both IaC and application code 
• Augments secrets scanning with the context of an IaC file around the secret

Use Developer-Friendly Integrations

• Natively integrates into existing developer tools, such as VCS and IDEs 
• Natively integrates into existing developer tools, such as VCS and IDEs 
• Integrates with DevOps workflows such as CI/CD pipelines 
• Surfaces both the exposed secret and the context around that secret to streamline risk prioritization and remediation 
• Blocks secrets from being pushed to a repository before a pull request is opened via a pre-commit hook and surfaces exposed secrets as part of a pull request scan
@SecureLayer
SecureLayer / Harden_GitHub_actions_workflows.md
Last active November 23, 2024 04:59
CI/CD Security with github actions

Best practices to harden GitHub Actions workflows and protect sensitive assets used during automated builds and deployments


1. Use minimal permissions for workflows

  • Set job permissions to read-only by default:
    permissions:
      contents: read  # Use only necessary permissions
@SecureLayer
SecureLayer / My_security_tools.md
Last active November 8, 2024 13:38
My_security_tools.md

1. Cloud Security

  1. CloudSploit

    • Continuous security monitoring for cloud environments (AWS, Azure, GCP).
    • Detects misconfigurations, policy violations, and suspicious behavior.
  2. Pacu

    • AWS exploitation framework for testing cloud environments’ security.
    • Useful for simulating attacks against IAM roles and other cloud assets.
  3. ScoutSuite

@SecureLayer
SecureLayer / Template_Secured_Terraform_multi-cloud_setup.md
Last active November 8, 2024 13:36
Template_Secured_Terraform_multi-cloud_setup.md

How to use this Template

  • Install Terraform: Ensure you have Terraform installed locally.
  • Configure providers: Authenticate with AWS, Azure and GCP using your credentials.
  • Set variables: Define the necessary variables in a .tfvars file.
  • Initialize Terraform : terraform init
  • Apply the configuration: terraform apply

#Folder structure for Multi-Cloud setup