Kali Linux

kics : Find security vulnerabilities, compliance issues, and infrastructure misconfigurations

KICS, which stands for Keeping Infrastructure as Code Secure, is an essential component of every cloud-native project and is open source. Use KICS by Checkmarx to identify security flaws, legal compliance problems, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code.

How it Works

KICS’s built-in extensibility is what makes it so strong and well-liked. Achieving this extensibility entails:

Queries are fully flexible and changeable heuristic rules. These are simple to alter, expand upon, and include.

a robust but still straightforward architecture that makes it simple to add support for new Infrastructure as Code solutions quickly.

KICS was developed using Open Policy Agent and is entirely open source (OPA).

Rego was a natural choice as a query language to implement security queries, while Golang’s speed, simplicity, and dependability made it the ideal choice for creating KICS.

For AWS, GCP, Azure, and other cloud providers, we have created more than a thousand ready-to-use queries that cover a wide range of vulnerabilities checks.

High-Level Architecture

KICS’s extendable pipeline of IaC language parsers and pluggable architecture make it simple to incorporate additional IaC languages and queries.

A command-line interface, parser, queries execution engine, IaC providers, security queries, and results writer are the key parts of KICS at a high level.

  • Provides CLI input to KICS using the command line interface.
  • The parser is in charge of processing the input IaC files (terraform and others)
  • Providers of IaC => IaC language is transformed into a normalised JSON \sQueries Execution Engine: uses pre-built REGO queries for each security and misconfiguration against normalised JSON Security Queries.
  • Writer => Outputs data in JSON format.

Execution Flow

R K

Recent Posts

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

20 hours ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

20 hours ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

1 day ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 days ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

6 days ago

How to Fix MyISAM Table Corruption in MySQL?

In MySQL Server 5.5 and earlier versions, the MyISAM was the default storage engine. So,…

1 week ago