Displaying 1 to 19 from 19 results

inspec - InSpec: Auditing and Testing Framework

  •    Ruby

InSpec is an open-source testing framework for infrastructure with a human- and machine-readable language for specifying compliance, security and policy requirements.InSpec makes it easy to run your tests wherever you need. More options are found in our CLI docs.

molecule - Molecule aids in the development and testing of Ansible roles.

  •    Python

Molecule is designed to aid in the development and testing of Ansible roles. Molecule provides support for testing with multiple instances, operating systems and distributions, virtualization providers, test frameworks and testing scenarios. Molecule is opinionated in order to encourage an approach that results in consistently developed roles that are well-written, easily understood and maintained. Molecule uses Ansible playbooks to exercise the role and its associated tests. Molecule supports any provider [1] that Ansible supports.

inspec - InSpec: Auditing and Testing Framework

  •    Ruby

InSpec is an open-source testing framework for infrastructure with a human- and machine-readable language for specifying compliance, security and policy requirements. InSpec makes it easy to run your tests wherever you need. More options are found in our CLI docs.

inspec-aws - InSpec for AWS

  •    Ruby

This repository is the development repository for InSpec for AWS. Once RFC Platforms is fully implemented in InSpec, this repository is going to be merged into core InSpec.As of now, AWS resources are implemented as an InSpec resource pack. It will ship with the required resources to write your own AWS tests.




cis-docker-benchmark - CIS Docker Benchmark - InSpec Profile

  •    Ruby

This InSpec compliance profile implement the CIS Docker 1.13.0 Benchmark in an automated way to provide security best-practice tests around Docker daemon and containers in a production environment. InSpec is an open-source run-time framework and rule language used to specify compliance, security, and policy requirements for testing any node in your infrastructure.

linux-baseline - DevSec Linux Baseline - InSpec Profile

  •    Ruby

This Compliance Profile ensures, that all hardening projects keep the same quality. Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

linux-patch-baseline - DevSec Linux Patch Baseline - InSpec Profile

  •    Ruby

This InSpec profile verifies that all updates have been installed on a RedHat/CentOS/Ubuntu machine. It uses the local package manager to determine the available packages.

mysql-baseline - DevSec MySQL Baseline - InSpec Profile

  •    Ruby

This Compliance Profile ensures, that all hardening projects keep the same quality.


nginx-baseline - DevSec Nginx Baseline - InSpec Profile

  •    Ruby

This Compliance Profile ensures, that all hardening projects keep the same quality. Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

php-baseline - DevSec PHP baseline - InSpec Profile

  •    Ruby

This is currently in development! Any feedback or Pull Request is welcome. Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

postgres-baseline - DevSec PostgreSQL Baseline - InSpec Profile

  •    Ruby

This Compliance Profile ensures, that all hardening projects keep the same quality. Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

ssh-baseline - DevSec SSH Baseline - InSpec Profile

  •    Ruby

This Compliance Profile ensures, that all hardening projects keep the same quality. Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

ssl-baseline - DevSec SSL/TLS Baseline - InSpec Profile

  •    Ruby

This Compliance Profile demonstrates the use of InSpec's SSL resource by enforcing strong TLS configuration. Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

windows-baseline - DevSec Windows Baseline - InSpec Profile

  •    Ruby

This Baseline ensures, that all hardening projects keep the same quality. Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

windows-patch-baseline - DevSec Windows Patch Baseline - InSpec Profile

  •    Ruby

If you require a graphical user interface Chef Compliance helps you to visualize the information.

inspec-verify-provision - Inspec for provising testing (Terraform)

  •    HCL

This repository demonstrates how to use InSpec with provising tools. Recent additions to InSpec 2.0 allow us to verify not only machines, but also any infrastructure provisioned in AWS or Azure cloud. This repository is providing guidance on the use of provising tools in conjunction with InSpec. The following example will provision a two-tier terraform architecture on AWS. It assumes that you have AWS credentials properly configured.

inspec-azure - InSpec Azure Resource Pack

  •    Ruby

This InSpec resource pack uses the Azure REST API and provides the required resources to write tests for resources in Azure. These must be stored in a environment variables prefaced with AZURE_. If you use Dotenv then you may save these values in your own .envrc file. Either source it or run direnv allow. If you don't use Dotenv then you may just create environment variables in the way that your prefer.

inspec-gcp - InSpec GCP (Google Cloud Platform) Resource Pack

  •    Ruby

This InSpec resource pack uses the native Google Cloud Platform (GCP) support in InSpec and provides the required resources to write tests for GCP. This implementation was inspired on the ideas by Martez Reed.

inspec-vmware - InSpec VMware Resource Pack (Incubation)

  •    Ruby

This repository contains a collection of InSpec resources used to interact with the VMware platform. In order to use the resources in this resource pack you must declare the dependency in your InSpec profile.