RELEASE and DEPLOY Phase
Last updated
Last updated
Deployment can be of infrastructure or application; however, we should scan our deployment files. We can also add a manual trigger where the pipeline waits for external user validation before proceeding to the next stage, or it can be an automated trigger.
It is always a good practice to scan your Kubernetes deployment or Helm chart before deploying. We can use to scans Kubernetes manifests and identifies security and configuration issues. It also supports Helm chart scanning. We can also use and to scan the Kubernetes manifest.
adds an extra layer of security where only the allowed type of manifest is deployed onto kubernetes, otherwise, it will reject or we can set validationFailureAction
to audit which only logs the policy violation message for reporting. and are alternative tools available to enforce policies on Kubernetes CRD.
Here is a simple to .
checks whether Kubernetes is deployed securely by running the checks documented in the CIS Kubernetes Benchmark. We can as a Job that runs daily and consume its report in CI/CD to pass or fail the pipeline based on the level of severity.
, and can be used to scan our Infrastructure code. It supports Terraform, Cloudformation, and Azure ARM resources.
can be used to test infrastructure in real-time.
After scanning for Kubernetes deployment and kube-bench we can deploy our application.