You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Grype and Trivy security vulnerability scanning (#348)
* Grype and Trivy security vulnerability scanning
Signed-off-by: Sebastian <[email protected]>
* Add grype security scan in github workflows
Signed-off-by: Sebastian <[email protected]>
* Ensure Grype is installed
Signed-off-by: Sebastian <[email protected]>
* Linting
Signed-off-by: Sebastian <[email protected]>
* Fix Push to GHCR
Signed-off-by: Sebastian <[email protected]>
* Fix key-less Cosign for image
Signed-off-by: Sebastian <[email protected]>
* Add info in SECURITY.md
Signed-off-by: Sebastian <[email protected]>
* Add info in docs
Signed-off-by: Sebastian <[email protected]>
---------
Signed-off-by: Sebastian <[email protected]>
Co-authored-by: Sebastian <[email protected]>
**Supply Chain Security**: We maintain strict oversight of our software supply chain through automated dependency vulnerability scanning, Software Bill of Materials (SBOM) generation, and license compliance checking to ensure all components meet security standards.
77
77
78
-
**Container Security Hardening**: Our containerized deployments follow security best practices including multi-stage builds, minimal base images (UBI Micro) with the latest updates, non-root user execution, read-only filesystems, and comprehensive container scanning with tools like Trivy, Dockle, and OSV-Scanner.
78
+
**Container Security Hardening**: Our containerized deployments follow security best practices including multi-stage builds, minimal base images (UBI Micro) with the latest updates, non-root user execution, read-only filesystems, and comprehensive container scanning with tools like Trivy, Grype, Dockle, and OSV-Scanner.
79
79
80
80
**Runtime Security Monitoring**: Beyond build-time security, we implement runtime monitoring and security policies to detect and respond to potential threats in production environments.
Our security toolchain includes **24+ different security and quality tools**, each serving a specific purpose in our defense strategy and executed on every pull request:
85
85
86
86
-**Static Analysis Security Testing (SAST)**: CodeQL, Bandit, and multiple type checkers
0 commit comments