Learn the basics of open-source license compliance and discover how to adopt a proactive, developer-first approach to open-source security.
Learn how to get visibility into risk exposure and prevent supply chain attacks with Bridgecrew’s software bill of materials (SBOM) generation capabilities.
Learn how to create customized and consistent code security scanning rules across the Bridgecrew platform and Checkov.
Learn how you can embed CI/CD best practices into your existing DevOps workflows with Checkov’s new CI/CD security policies.
Checkov 2.1 is packed with scanning support for new IaC frameworks, expanded supply chain and AppSec use cases, and more.
Bridgecrew and Checkov now support scanning Bicep templates for misconfigurations! See how you can scan your IaC files and compare them against Azure security best practices.
Learn how to prevent Terraform supply chain weaknesses across code and delivery pipelines with Checkov to prevent software supply chain attacks.
Policy severities are now included in Checkov to help prioritize findings and make CI/CD skip and fail flags more manageable.
Our new Kubernetes Admission features Checkov as the core validator for Kubernetes manifests, preventing vulnerable or misconfigured Kubernetes objects from being deployed.
Now with Checkov, you can make reusable Kustomize manifests and all of the resulting environments more secure from the start.
Learn about CVE-2022-0185, the latest Linux kernel vulnerability that allows container escape in Kubernetes, and how Checkov’s built-in policies mitigate it.
We combined the powers of Cloudsplaining (with the help of its creator Kinnaird McQuade) and Checkov to help organizations assess IAM policies in both build-time and runtime.