Skip to content

Latest commit

 

History

History
46 lines (31 loc) · 2.36 KB

File metadata and controls

46 lines (31 loc) · 2.36 KB

Watchtower Module: Checkov

This module integrates with the Checkov scanner to scan infrastructure-as-code files (such as Terraform or Kubernetes) for common issues. There are many checks built-in to Checkov that can be easily configured as core rules within Watchtower. Custom Checkov rules are not currently supported by Watchtower.

This Checkov Module expects Python 3.7+ to be installed along with pip in the operating environment using the 'python3' and 'pip3' binaries, respectively. It is highly recommended to create a virtual environment for python and add it to the Java execution PATH as in the Dockerfile provided in the overall installation. This module will install the correct version of Checkov in this environment, and will try to make sure that the checkov code is correctly installed. It is recommended to wipe or clean the virtual environment as part of startup, though this module will attempt to correct any mistakes in the environment.

License

MIT License

Table of Contents

Module Name

Checkov

Database Schema History Table

checkov_schema_history

Database Migrations Location

db/checkov

Additional Rule Fields

Field Description Example
core Boolean indicating whether this is a core Checkov check true if this is a core rule; false otherwise
type The category the check belongs to See Policies for more info.
entity The supported resource entities for the check See Policies for more info.
iac The IaC type that would be tested under the check "terraform" or "cloudformation"
code The Python code defining a custom Checkov rule See Policies for more info.

Note that the name of a core Checkov rule in Watchtower must match the ID of the built-in Checkov check. This ID follows the pattern CKV_providerType_serialNumber (e.g. "CKV_AWS_9" , "CKV_GCP_12").