Skip to content

Commit

Permalink
GITBOOK-75: No subject
Browse files Browse the repository at this point in the history
  • Loading branch information
Talia Rosin authored and gitbook-bot committed Jan 30, 2025
1 parent d5a41a3 commit 03adc32
Show file tree
Hide file tree
Showing 2 changed files with 173 additions and 0 deletions.
114 changes: 114 additions & 0 deletions products-1/advanced-security/README.md
Original file line number Diff line number Diff line change
@@ -1,2 +1,116 @@
# Advanced Security

**JFrog Advanced Security** is a robust security solution that protects software supply chains by providing **deep vulnerability analysis, exposure detection, and advanced threat intelligence**. Integrated with **JFrog Xray**, it enables developers and security teams to **identify, analyze, and remediate security risks** across the entire software development lifecycle.

### **Where Xray Fits in the JFrog Security Timeline**



## **Business Needs for JFrog Advanced Security**

**JFrog Advanced Security** addresses critical business needs by ensuring secure software development, supply chain protection, and regulatory compliance.

**Protecting the Software Supply Chain**

* Prevents **malicious code injection, dependency attacks, and misconfigurations** that could compromise the integrity of software.
* Identifies **vulnerabilities in open-source dependencies** before they become security risks.
* Ensures that all software artifacts are **secure from development to deployment**.

**Reducing Security Risks and False Positives**

* Uses **contextual analysis** to **eliminate false positives** and prioritize actual threats.
* Detects **secrets exposure (API keys, credentials, tokens) to prevent data leaks**.
* Scans for **insecure configurations** in applications, infrastructure, and services.

**Enforcing Compliance and Regulatory Requirements**

* Helps businesses adhere to **security standards like ISO 27001, NIST, SOC 2, GDPR, and more**.
* Automates security policies to **enforce best practices and compliance** across development teams.
* Provides **audit trails and reporting** for security assessments and regulatory needs.

**Enhancing DevSecOps and CI/CD Pipelines**

* Seamlessly integrates into DevOps workflows, enabling **continuous security scanning** without slowing down development.
* Offers **REST APIs** for embedding security checks into CI/CD pipelines.
* Allows security teams to **define policies** that automatically enforce secure development practices.

**Improving Operational Efficiency and Cost Savings**

* Reduces time spent on **manual vulnerability triage** by focusing on exploitable risks.
* Minimizes the risk of **costly breaches, downtime, and reputational damage**.
* Ensures security is **built-in from the start**, reducing remediation costs later in the SDLC.

**Supporting Cloud-Native and Hybrid Environments**

* Scans **Docker, Kubernetes, and cloud-based applications** for security vulnerabilities.
* Ensures **secure software delivery across multi-cloud and hybrid environments**.
* Detects risks in **infrastructure-as-code (IaC) configurations**.

## **Purpose of JFrog Advanced Security**

**Secure the Software Supply Chain** – Prevent malicious code injection, dependency attacks, and misconfigurations.

**Detect and Remediate Vulnerabilities** – Identify security flaws in open-source dependencies, containers, and infrastructure.

**Eliminate False Positives with Contextual Analysis** – Prioritize real security threats by assessing exploitability within the artifact’s context.

**Prevent Secrets Exposure** – Detect leaked API keys, credentials, and sensitive data to avoid security breaches.

**Ensure Compliance with Industry Standards** – Automate security policies to meet **ISO 27001, SOC 2, NIST, GDPR, and other regulations**.

**Integrate Security into DevOps (DevSecOps)** – Embed security checks directly into CI/CD pipelines for **continuous security scanning**.

**Enable Automated Security Policies** – Define security rules to enforce best practices and prevent high-risk deployments.

**Reduce Operational Costs and Risk** – Minimize time spent on security triage, prevent costly breaches, and streamline remediation.

**Support Cloud-Native Security** – Scan **Docker, Kubernetes, and cloud environments** for misconfigurations and vulnerabilities.

**Enhance Software Quality and Reliability** – Ensure only **secure and compliant** artifacts move to production.

## **Main Features**

General

* **Comprehensive Software Security** – Scans artifacts, repositories, and builds for security risks.
* **DevSecOps Integration** – Embeds security into CI/CD pipelines with minimal disruption.
* **REST API Support** – Enables automation of security scans, policy enforcement, and reporting.
* **Security Policy Enforcement** – Allows organizations to define and apply security rules automatically.
* **Regulatory Compliance** – Supports **ISO 27001, SOC 2, NIST, GDPR, and other standards**.

Software Composition Analysis (SCA)

* **Open Source Vulnerability Scanning** – Identifies risks in Maven, npm, PyPI, Go, Docker, and more.
* **License Compliance Management** – Detects and enforces policies for open-source license usage.
* **Dependency Analysis** – Scans direct and transitive dependencies for security risks.
* **Policy-Based Risk Management** – Defines security actions based on severity levels.

SBOM

* **SBOM Generation** – Provides a **detailed inventory of all software components** in an application.
* **Continuous SBOM Monitoring** – Keeps SBOM updated with new security insights.
* **Vulnerability Exposure Tracking** – Maps vulnerabilities to software components in real time.

***

Advanced Vulnerability & Exposure Scanning

* **Contextual Analysis** – Reduces false positives by verifying **actual exploitability** within an artifact.
* **Exposure Scanning** – Detects **misconfigurations, weak authentication, and excessive privileges**.
* **Infrastructure-as-Code (IaC) Security** – Identifies risks in **Terraform, AWS, Azure, and GCP** configurations.
* **Application Security Scanning** – Scans Python, Node.js, and other applications for **insecure implementations**.
* **Secrets Detection** – Finds **leaked API keys, credentials, and private keys** in artifacts and repositories.

***

Container & Cloud Security

* **Docker & OCI Image Scanning** – Identifies vulnerabilities in **containerized applications**.
* **Kubernetes Security** – Ensures **secure container deployments** and identifies misconfigurations.
* **Cloud Security Posture Management (CSPM)** – Detects misconfigurations in cloud environments.

Security Results & Remediation

* **Real-Time Security Dashboard** – Displays vulnerabilities, exposures, and remediation suggestions.
* **On-Demand Scanning** – Allows users to **scan specific artifacts or entire repositories**.
* **Violation Management & Suppression** – Enables users to **ignore false positives** and manage risks efficiently.
59 changes: 59 additions & 0 deletions products-1/advanced-security/supported-technologies.md
Original file line number Diff line number Diff line change
@@ -1,2 +1,61 @@
# Supported Technologies

## **Supported Package Types for Vulnerability & Exposure Scanning**

| **Package Type** | **Supported in Xray Version** |
| ----------------------------------- | ----------------------------- |
| **Docker** | 3.59.4+ |
| **OCI (Open Container Initiative)** | 3.59.4+ |
| **Maven** | 3.78.9+ |
| **npm** | 3.78.9+ |
| **PyPI** | 3.78.9+ |
| **Gradle** | Supported |
| **Go Modules** | Supported |
| **Alpine** | Supported |
| **Debian** | Supported |
| **RPM** | Supported |
| **NuGet** | Supported |
| **RubyGems** | Supported |
| **Generic Artifacts** | Supported |

## **Supported Technologies for Contextual Analysis**

| **Repository Type** | **Supported Languages Inside Containers** | **Supported Languages in Source Code Analysis** |
| ------------------- | --------------------------------------------------------------------------------- | ----------------------------------------------- |
| **Docker** | Java, Go, Python, JavaScript, TypeScript, Rust (Cargo), .NET, C/C++ (ELF), Kotlin | Java, Go, Python, JavaScript, TypeScript |
| **Maven** | Java (Uber JAR) | Java |
| **Gradle** | Java | Java |

**Notes:**

* **Maven support requires Xray 3.77.4+** (Uber JAR format).
* **Rust binaries require Xray 3.79.x+.**
* **.NET binaries require Xray 3.95.4+.**

## **Supported Infrastructure-as-Code (IaC) Scanning**

| **Cloud Provider** | **Scanned Configurations** |
| ------------------ | --------------------------------------------------------------------------------------------- |
| **AWS** | IAM Policies, S3 Buckets, RDS, API Gateway, Lambda, EC2, ECS, CloudTrail, Kinesis, Glue, etc. |
| **Azure** | Storage Accounts, Key Vaults, Networking, Virtual Machines, RBAC, Logging, etc. |
| **Google Cloud** | IAM Policies, Cloud Storage, Kubernetes, Compute Engine, Cloud Functions, etc. |

***

## **Supported Services for Configuration Security Scanning**

| **Service** | **Common Security Issues Detected** |
| -------------- | ---------------------------------------------------------------- |
| **NGINX** | Insecure credentials, weak TLS settings, exposed admin interface |
| **Apache** | Weak authentication, missing HTTPS enforcement |
| **Envoy** | Misconfigured access policies, excessive privileges |
| **Etcd** | Unauthenticated access, weak crypto settings |
| **Prometheus** | Insecure endpoints, unauthorized access |

## **Supported Secret Scanning**

| **Supported Platforms for Secrets Detection** | **Types of Secrets Detected** |
| --------------------------------------------------------------------------------------------- | ----------------------------------------------------------------- |
| JFrog Platform (Docker, Maven, npm, PyPI, NuGet, Gradle, RPM, Alpine, Go, RubyGems, Generic) | API Keys, Tokens, Private Keys, High Entropy Secrets, URL Secrets |
| Developer Tools (IDE Plugins, CLI, Git Hooks) | API Keys, Passwords, Credentials in Source Code |
| Cloud Services (AWS, Azure, GCP, GitHub, GitLab, npm, Slack, Terraform, Stripe, Twilio, etc.) | API Keys, Authentication Tokens, OAuth Secrets |

0 comments on commit 03adc32

Please sign in to comment.