DSP AppSec Infrastructure Apps

DSP AppSec Infrastructure Apps

  • Docs

›Configurations

Cluster Deployed Applications

  • Cluster Deployed Security Apps

Kubernetes Cluster

  • AppSec Infrastructure

Sdarq

  • Sdarq

ZAP Scan Automation

  • Zap Scan Automation

CIS Scan Automation

  • CIS Scan Automation

How we use DefectDojo & CodeDx

  • How we use DefectDojo & CodeDx

Secret Deployment

  • Secret deployment for each app

Configurations

  • Configurations

Configurations

In your Google project set up Cloud Build trigger. Check cloudbuild.yaml file for more information.

Add these to Substitution variables:

  • _ORG_VIEWER_SA_EMAIL email of an existing Service Account with Org Viewer role
  • _DNS_DOMAIN fully-resolved DNS domain name (e.g. appsec.example.org)
  • _DNS_ZONE DNS zone name to be created/updated (e.g. appsec)
  • _CIS_CONTROLS_IGNORE CIS controls rule to ignore
  • _SECURITY_CONTROLS_IGNORE list of security controls that are flagged as false positives
  • _CODACY_ORGS in-scope Codacy organizations as a comma-delimited list
  • _SONAR_ORGS in-scope SonarCloud organizations, as a comma-delimited list of mappings from GitHub to SonarCloud organization (e.g. githuborg=sonarcloudorg,ghorg2=scorg2)
  • _IAP_ALLOWLIST list of members that will have access in add/edit/delete security controls for a service endpoint, xv@companyname.com,yz@companyname.com
  • _IAP_AUDIENCE IAP audience generated from IAP in the GCP project

architecture

← Secret deployment for each app
Copyright © 2024 DSP AppSec - Broad Institute