Skip to content
This repository was archived by the owner on Oct 14, 2020. It is now read-only.

Commit c65a8fc

Browse files
authored
Merge branch 'master' into hooks
2 parents 42e3b77 + 4f0a0dd commit c65a8fc

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

README.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ For additional documentation aspects please have a look at our:
4242
The typical way to ensure application security is to hire a security specialist (aka penetration tester) at some point in your project to check the application for security bugs and vulnerabilities. Usually, this check is done at a later stage of the project and has two major drawbacks:
4343

4444
1. Nowadays, a lot of projects do continuous delivery, which means the developers deploy new versions multiple times each day. The penetration tester is only able to check a single snapshot, but some further commits could introduce new security issues. To ensure ongoing application security, the penetration tester should also continuously test the application. Unfortunately, such an approach is rarely financially feasible.
45-
2. Due to a typically time boxed analysis, the penetration tester has to focus on trivial security issues (low-hangig fruits) and therefore will not address the serious, non-obvious ones.
45+
2. Due to a typically time boxed analysis, the penetration tester has to focus on trivial security issues (low-hanging fruits) and therefore will not address the serious, non-obvious ones.
4646

4747
With the _secureCodeBox_ we provide a toolchain for continuous scanning of applications to find the low-hanging fruit issues early in the development process and free the resources of the penetration tester to concentrate on the major security issues.
4848

@@ -92,22 +92,24 @@ helm install persistence-elastic ./hooks/persistence-elastic/
9292

9393
```bash
9494
# Now everything is installed. You can try deploying scans from the `operator/config/samples/` directory
95-
## Localhost Scan Examples
95+
## Local Scan Examples
96+
9697
### E.g. localhost nmap scan
9798
kubectl apply -f operator/config/samples/execution_v1_scan/nmap_localhost.yaml
98-
9999
kubectl apply -f operator/config/samples/execution_v1_scan/kube-hunter_in_cluster.yaml
100-
kubectl apply -f operator/config/samples/execution_v1_scan/trivy_mediawiki.yaml
101-
kubectl apply -f operator/config/samples/execution_v1_scan/trivy_juiceshop.yaml
100+
102101
## Public Scan Examples
103102
# E.g. www.securecodebox.io sslyze scan
104103
kubectl apply -f operator/config/samples/execution_v1_scan/nmap_securecodebox_io.yaml
105104
kubectl apply -f operator/config/samples/execution_v1_scan/amass_securecodebox_io.yaml
106105
kubectl apply -f operator/config/samples/execution_v1_scan/sslyze_securecodebox_io.yaml
107106
kubectl apply -f operator/config/samples/execution_v1_scan/nikto_securecodebox_io.yaml
108-
109107
kubectl apply -f operator/config/samples/execution_v1_scan/ssh_iteratec_de.yaml
110108
kubectl apply -f operator/config/samples/execution_v1_scan/wpscan_nurdemteam_org.yaml
109+
kubectl apply -f operator/config/samples/execution_v1_scan/sslyze_securecodebox_io.yaml
110+
kubectl apply -f operator/config/samples/execution_v1_scan/trivy_mediawiki.yaml
111+
kubectl apply -f operator/config/samples/execution_v1_scan/trivy_juiceshop.yaml
112+
111113
# Then get the current State of the Scan by running:
112114
kubectl get scans
113115
```

0 commit comments

Comments
 (0)