Book Image

Accelerating DevSecOps on AWS

By : Nikit Swaraj
Book Image

Accelerating DevSecOps on AWS

By: Nikit Swaraj

Overview of this book

Continuous integration and continuous delivery (CI/CD) has never been simple, but these days the landscape is more bewildering than ever; its terrain riddled with blind alleys and pitfalls that seem almost designed to trap the less-experienced developer. If you’re determined enough to keep your balance on the cutting edge, this book will help you navigate the landscape with ease. This book will guide you through the most modern ways of building CI/CD pipelines with AWS, taking you step-by-step from the basics right through to the most advanced topics in this domain. The book starts by covering the basics of CI/CD with AWS. Once you’re well-versed with tools such as AWS Codestar, Proton, CodeGuru, App Mesh, SecurityHub, and CloudFormation, you’ll focus on chaos engineering, the latest trend in testing the fault tolerance of your system. Next, you’ll explore the advanced concepts of AIOps and DevSecOps, two highly sought-after skill sets for securing and optimizing your CI/CD systems. All along, you’ll cover the full range of AWS CI/CD features, gaining real-world expertise. By the end of this AWS book, you’ll have the confidence you need to create resilient, secure, and performant CI/CD pipelines using the best techniques and technologies that AWS has to offer.
Table of Contents (15 chapters)
1
Section 1:Basic CI/CD and Policy as Code
5
Section 2:Chaos Engineering and EKS Clusters
9
Section 3:DevSecOps and AIOps

Kubernetes hardening guidance using Kubescape

In this section of the chapter, we will learn about the hardening guidance of the EKS cluster using Kubescape. Kubescape is an open source tool, developed by ARMO. Kubescape was developed in line with all of the recommendations and guidance from the NSA and CISA. Kubescape tests whether a Kubernetes cluster is deployed securely according to multiple frameworks: regulatory, customized company policies, and DevSecOps best practices, such as the NSA/CISA and MITRE ATT&CK.

It not only scans Kubernetes clusters, but also YAML files and Helm Charts, and detects misconfigurations and software vulnerabilities at early stages of the CI/CD pipeline. To get the Kubescape recommendations for the EKS cluster, perform the following steps:

  1. Connect to the bastion server and install the binary of kubescape:
    $ curl -o kubescape.sh https://raw.githubusercontent.com/armosec/kubescape/master/install.sh
    $ vi kubescape.sh 
    #### Look for install_dir...