Skip to content

AWS Code Pipeline - Secret Scan

This document contains the process of integrating AccuKnox Secret Scan with AWS CodePipeline. By integrating AccuKnox Secret Scan into the pipeline, you can identify and resolve security vulnerabilities for your applications.

Prerequisites

Before beginning the integration, ensure you have the following:

Configuration Steps

Step 1: Configure AWS CodePipeline Environment Variables

Add the following environment variables to your CodeBuild project or pipeline configuration. 📖 Reference: Set Environment Variables in CodeBuild Project

Name Description Required Example Value
ACCUKNOX_ENDPOINT The URL of the CSPM panel to push the scan results to Yes cspm.demo.accuknox.com
ACCUKNOX_TOKEN Token for authenticating with the AccuKnox CSPM panel. How to Create Tokens Yes your_api_token_here
ACCUKNOX_LABEL Label identifier for organizing scan results Yes test123
ACCUKNOX_TENANT AccuKnox tenant ID Yes 167

Step 2: Configure AWS CodeBuild Specification (buildspec.yml)

Create or update your buildspec.yml file in your repository root with the following configuration:

version: 0.2

env:
  variables:
    RESULTS: ""
    BRANCH: "all"
    EXCLUDE_PATHS: ""

phases:
  pre_build:
    commands:
      - echo "Installing AccuKnox ASPM scanner..."
      - pip install https://github.com/accuknox/aspm-scanner-cli/releases/download/v0.12.1/accuknox_aspm_scanner-0.12.1-py3-none-any.whl --break-system-packages

  build:
    commands:
      - |
        echo "Running AccuKnox secret scan"

        if [ "$SOFT_FAIL" = "true" ]; then
          SOFT_FAIL_ARG="--softfail"
        fi

        COMMAND="git file://."
        ARGS=""
        [ -n "$RESULTS" ] && ARGS="$ARGS --results $RESULTS"
        [ -n "$BRANCH" ] && ARGS="$ARGS --branch $BRANCH"
        [ -n "$EXCLUDE_PATHS" ] && ARGS="$ARGS --exclude-paths $EXCLUDE_PATHS"

        echo accuknox-aspm-scanner scan $SOFT_FAIL_ARG secret --command "$COMMAND $ARGS" --container-mode
        accuknox-aspm-scanner scan $SOFT_FAIL_ARG secret --command "$COMMAND $ARGS" --container-mode

Workflow Execution

Without AccuKnox

📖 Reference

  • Scans secrets for vulnerabilities but does not forward results to AccuKnox, requiring manual review.

With AccuKnox

📖 Reference

  • Scan results are automatically sent to AccuKnox for further risk assessment and remediation.

alt

Viewing Results in AccuKnox

📖 Reference

  1. After the pipeline run, log in to AccuKnox.
  2. To see all of your Secret Scan findings, navigate to: AccuKnox → Issues → Findings → Secret Scan Findings alt

  3. Click on any finding to get more details. You can also click on Create Ticket to generate a ticket. alt

Let us know if you are seeking additional guidance in planning your cloud security program.