|8 days ago||over 2 years ago|
|GNU General Public License v3.0 or later||MIT License|
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
We haven't tracked posts mentioning in-toto-golang yet.
Tracking mentions began in Dec 2020.
Terraform in AWS
4 projects | dev.to | 17 Apr 2022
Using pre-commit framework with terraform repository, will help your code to be kept clean, formated, updated document and checked for tf security issues (optional with tfsec) before committing and pushing the code to git source.
Terraforming in 2021 – new features, testing and compliance
12 projects | dev.to | 2 May 2021
Here again more than one tool exists to assist. We will highlight two of the most popular ones here: tfsec and checkov. Both provide a predefined set of checks that they use to inspect your code, allowing to explicitly open exceptions (if you really want to) by annotating your code with comments, and adjust the configuration to ignore some modules, for example.
How FirstPort manage GitHub, using code stored in GitHub
5 projects | dev.to | 27 Apr 2021
An additional benefit of using a CI workflow is adding automated tests. In this scenario, I’ve added a step leveraging tfsec to scan for static code vulnerabilities. In the example below, tfsec warns against creating an Azure network security rule which is fully open. This will halt and fail the workflow unless I provide an ignore comment to accept the warning.
Terraform v15.0 with AWS (EKS deployment)
7 projects | dev.to | 17 Apr 2021
· Provision an EKS Cluster (AWS) · Terraform v15.0 · Terraform Registry · Pre-Commit · Terraform Pre-commit · Terraform-docs · Tflint · Tfsec
A way to restrict options for devs in AWS
2 projects | /r/devops | 2 Apr 2021
Using terraform, create a skeleton directory that they can review for how EC2 instances should be created. Use tools like https://github.com/tfsec/tfsec or other scanners/linters to validate that your developers followed this process and didn't uncheck something.
Gopher Gold #15 - Wed Oct 14 2020
16 projects | dev.to | 14 Oct 2020
tfsec/tfsec (Go): 🔒🌍 Static analysis powered security scanner for your terraform code
What are some alternatives?
checkov - Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
tflint - A Pluggable Terraform Linter
terrascan - Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
atlantis - Terraform Pull Request Automation
pre-commit-hooks - Some out-of-the-box hooks for pre-commit
cosign - Container Signing
terraform-aws-gitlab-runner - Terraform module for AWS GitLab runners on ec2 (spot) instances
pre-commit - A framework for managing and maintaining multi-language pre-commit hooks.
conftest - Write tests against structured configuration data using the Open Policy Agent Rego query language
terratest - Terratest is a Go library that makes it easier to write automated tests for your infrastructure code.
terraform - Terraform enables you to safely and predictably create, change, and improve infrastructure. It is a source-available tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned.
pre-commit-terraform - pre-commit git hooks to take care of Terraform configurations 🇺🇦