- Checkov 2.0's new graph-based framework enables dependency-aware infrastructure as code (IaC) scanning in complex distributed environments.
SANTA CLARA, Calif., April 8, 2021 /PRNewswire/ -- Palo Alto Networks (NYSE: PANW), today announced the second generation of Checkov, the market-leading static analysis tool for infrastructure as code (IaC). The open-source project was created by Bridgecrew, which was acquired by Palo Alto Networks in March 2021. Checkov has exploded in popularity since its initial launch in 2019, helping developers identify misconfigurations in IaC frameworks such as Terraform, CloudFormation, Kubernetes, Azure Resource Manager (ARM) and Serverless Framework. With Checkov 2.0, developers can now scan for cloud misconfigurations in environments with complex dependencies across resources and modules.
"This release is the most significant update to Checkov since it launched in 2019," said Matt Johnson, Bridgecrew developer advocate lead at Palo Alto Networks. "Dependency awareness means developers have even more context earlier in the development lifecycle, helping companies around the world better secure their cloud infrastructure."
According to a recent survey produced by Secure Code Warrior, 70% of organizations recognize the importance of secure coding practices, indicating an industry-wide shift from reaction to prevention and an embrace of DevSecOps. Unlike other static code analysis tools that rely on interim ad hoc modeling, Checkov is now built on a graph-based model that provides an entirely new way of modeling configuration risk in cloud native software composition. That context awareness ensures more relevant and reliable scan results, making it easier for developers to prioritize and understand the impact of identified misconfigurations.
"Policies that take into account interdependencies within IaC are critical to understanding the impact of misconfigurations," said Rob Eden, a Checkov contributor. "It's not enough to know that a security group has ports open to the world; we need to know if that misconfiguration is in production or just a test environment in order to prioritize it appropriately. It's awesome to have an open-source tool providing that level of context."
Highlights
- Over 200 new policies making it the most robust open-source IaC scanner.
- Built using NetworkX, the popular Python package for analysis of complex networks.
- Dockerfile misconfiguration scanning secures container build tasks in continuous integration (CI) workflows.
- Graph-based mapping enables scanning of complex inventory and configuration errors that require parsing and storing data with their full contextualized relationships intact.
Checkov 2.0 includes over 200 new policies and a Dockerfile scanner that help ensure container images are built securely, without misconfigurations. According to Unit 42's most recent Cloud Threat Report, 51% of Docker containers use insecure defaults. Checkov 2.0 identifies these concerns directly within the developer's integrated development environment (IDE) via the recently released VS Code extension, making it easy to quickly patch and build more secure applications in Kubernetes and other containerized environments.
For further details, see Palo Alto Networks' blog post: Announcing Checkov 2.0: Deepening Open Source IaC Security.
About Checkov
Checkov is an open-source static analysis and policy-as-code engine for Terraform, CloudFormation, Kubernetes, Azure Resource Manager, and Serverless Framework. With over 1.2 million downloads, Checkov fits into any developer workflow to provide a simple and flexible tool for scanning IaC and enforcing codified, version-controlled policies. Checkov is written in Python and comes pre-built with hundreds of policies that cover security and compliance best practices across AWS, Azure, Google Cloud, and Kubernetes. For more information, visit www.checkov.io.
About Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.
Palo Alto Networks and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names, or service marks used or mentioned herein belong to their respective owners.
SOURCE Palo Alto Networks, Inc.