-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement GHA workflow that runs Enhanced Image Scans on container builds and pushes #2188
Comments
POC: Jonathan Kamens; vfs-platform-support |
I opened a yourIT ticket to get inpsector permissions added to our project-admin permissions boundary. Once that has been added, I can proceed with this work. |
No update on the yourIT ticket -- still waiting for permission boundaries to be updated. |
Update on the ticket: it was closed out with a comment indicating that the ticket needs to be opened up under a different service in yourIT. I opened that ticket today and hopefully will hear back soon. |
The request in yourIT has been approved. I have been moved through the flow and have been told to not take action. They will update the IAM permission boundary shortly. |
There is an approver marked on the yourIT ticket. I left a comment on the ticket asking if there is anything I need to do in order to help move the approval process along. If I don't hear a response by end of week, I'll reach out to our PO. |
Corey escalated to Dave and I for help. I reached out to Angela (the approver) via email and she approved. |
Permissions for inspector2 were added to the boundary, but permissions were not added for "inspector-scan:*", which is ultimately what we need to perform these scans via the API. I left a comment on the yourIT ticket asking for the additional scan permissions. Continuing to play the waiting game. |
User Story - Business Need
After the spike on Enhanced Image Scanning, we determined we want to implement AWS Enhanced Image Scanning as part of our CI/CD workflow. This will work similar to how Twistlock works now (running as a separate workflow during the CD pipeline, but not failing the entire pipeline). Instead, we want to alert slack of we do not meet our security thresholds of the image scan.
User Story(ies)
As a VA Notify Developer
I want Enhanced Image Scanning baked into CD with Slack alerting
So that we can keep on top of security vulnerabilities.
Additional Info and Resources
We will be utilizing the official AWS GHA for this work: on-inspector?tab=readme-ov-file#build-and-scan-container-images
Acceptance Criteria
QA Considerations
Potential Dependencies
We will not be deleting any Twistlock infrastructure or GHA workflows as part of this work.
The text was updated successfully, but these errors were encountered: