[Security] Add security scanners to CI pipeline #7503
Labels
epic
A high level ticket with subtickets for development (ticket type)
technology
Technical issues, e.g. synchronization, libraries, plugins, etc.
Situation Description & Motivation
log4shell
was a close call and we need plan ahead for the next crisis. One step forward is to make more use of static security tools and dependency analysis. Catch well known security issues at compile time.Use cases
High-Level Explanation
Timeline
Tasks
CodeQL
to GitHub actions #7504trivy
andsonar
repo scan to GitHub actions [3] #7542Add-> Doesn't make sense now: 1. We want to integrate the docker settings into the SORMAS-Project repository. 2. The recent changes make it very likely that we will move the docker images to the github repository https://www.heise.de/news/Docker-Hub-streicht-kostenloses-Angebot-Open-Source-Projekte-muessen-handeln-7547959.htmltrivy
container scan (Needs more analysis as our current container build pipeline is sub optimal. We could setup a weekly GitHub Action scan of the docker images published to docker hub)Add-> Covered by trivy and sonarcloudowasp-dependency-check
and fail on insecure buildsEvaluate https://github.com/SUPERAndroidAnalyzer/super--> outdatedAlternatives
None really, this is the bare minimum we need to do.
Risks
Additional Information
The text was updated successfully, but these errors were encountered: