Identity-Centric SDLC Security & Governance

By: BlueFlag Security

We divide SDLC governance into four categories:

1. Identity Governance-> Ensuring each developer or service account has only the permissions & entitlements their need to do their jobs.

2. CI/CD Governance--> Ensuring compliant and automated posturing

3. Code Governance--> Package analysis from an identity centric perspective (Who brought it in? Who built it); license status (LGPL, AGPL, GPL); and secret leakage detections, SAST and IaC Terraform scans

4. Compliance Governance--> Ensuring continuous compliance against each of your standards (SoC2, ISO, etc).

We connect via API or On-Prem connector to your data sources, and ticketing services. Our objective is to provide the business logic (not a new interface for the entire team) to automate and remediate your SDLC Governance attack surface.

Features
  • Identity Centric Controls for SDLC permissions and entitlements for each developer & service account
  • Association of each package to the date, time, and identity of importer + dependency maps across the repository environment
  • Integration with Code Repository, CI/CD tools, Artifact Repositories, Code Scanning tools, RTEs, etc
  • Automated Compliance and Remediation
  • Outbound integration with Slack, JIRA, Splunk, Teams, and other tools already used in the SDLC remediation process
Benefits
  • Reduced Attack Surface of over provisioned service and developer accounts across the SDLC
  • Elevation of contributor risk of the open source packages already in your repositories
  • Secret Leakage Detection, SAST, and IaC Terraform Scans
  • JIT SDLC Permissions through Slack to eliminate bureaucratic repository access processes
  • Automated CI/CD posturing across the entire SDLC
  • Continuous Compliance Assessments and Automated Remediation across NIST, SOC2, ISO, etc
Prerequisites
  • We can get started with read-only service account access to your existing code repository environment.
  • Snyk Account
How it Works
  • SDLC analyzes the metadata from your SDLC infrastructure to show large attack surfaces and risks at an identity level of detail
Demo Video

Documentation
Version:
4.2.3

Integration Categories:
Continuous Integration (Pipeline Mgmt)

Support:
support@blueflagsecurity.com

Snyk Products:
Snyk Code

Website

Contact