Skip to content

Daplanet/lab-iac-policy

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Lunch and learn Lab - Securing CI/CD pipelines with Policy-as-code

Goals

Create a base lab environment in GCP for running Gitlab, Vault, Open Policy Agent for testing and learning Policy-as-code enabled Shift left security in pipelines.

Roadmap

Version 1.0 - Initial Release

  • Initial lab environment with gitlab and vault in gcp
  • opa evaluated terraform
  • helm charts deployed and validated from terraform
  • whitelisted charts only allowed in policies
  • deny google cloud iam changes
  • use weighted values for changes based on risk evaluation
  • deny unless service apis are whitelisted

Version 1.1 - Vault management

  • Integrate vault secret store into kubernetes
  • Manage vault users via terraform

Version 2.0 - Convert to Modular code

  • Migrate terraform code to modules

Slidedeck

Google Slides

Launch in Google Cloud Shell

Open in cloud shell

Tooling

  • OpenPolicy Agent Validation of terraform, vault policy, and helm deployments based on Rego policy files in policy/
  • Snyk provides security scanning, secret scanning, policy as code tests, CVE scanning, Licence checks, Dependancy/Version Management, and code scanning
  • Terraform Cloud is our GitOps workflow for managing deployments of IaC and Applications via Helm charts
  • GKE is our cloud of choice.

Variables

Some services would need to be setup before hand then one needs to pass these along as terraform varables

Name Description
_SNYK_API_KEY (string) Snyk enterprise api key
_INFRACOST_API_KEY (string) infracost api key

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • HCL 61.5%
  • Open Policy Agent 31.1%
  • Makefile 7.4%