We scanned the Terraform Registry and analyzed the overall state of infrastructure-as-code security and compliance. Read the full report to learn about the security posture of the IaC ecosystem.
This post is the second of two parts on why DevSecOps can end up backfiring within cloud-native organizations and what you can do about it.
With Bridgecrew's Custom Policies, you can easily govern your cloud infrastructure without learning a new language.
A super simple walkthrough integrating Buildkite and the Bridgecrew platform, adding Infrastructure as code scanning to your CI pipelines.
The first of two posts on why DevSecOps can end up backfiring within cloud native organizations and what you can do about it.
We’re excited to release CfnGoat 🐐, a security training project for AWS CloudFormation. In addition…
Learn about infrastructure as code (IaC) and Terraform security best practices in this Bridgecrew and HashiCorp webinar recording and recap.
Learn how to scan your Terraform files as part of every code review for misconfigurations and policy violations using GitHub and Bridgecrew.
Bridgecrew embeds seamlessly into the GitHub ecosystem to provide consistent and timely IaC security feedback.
Bridgecrew's cloud security platform enabled Rapyd's engineering team to stay on top of industry best practices and fix cloud misconfigurations.
Learn how to scan for security and compliance violations within your CloudFormation templates generated by AWS CDK at build-time with Bridgecrew.
Addressing cloud security in run-time alone isn't enough. Learn the pros of doing both run-time and build-time security together.
Bridgecrew now extends the Serverless Framework’s existing security and compliance policy to secure configurations on AWS.