Kali Linux

kics : Find security vulnerabilities, compliance issues, and infrastructure misconfigurations

KICS, which stands for Keeping Infrastructure as Code Secure, is an essential component of every cloud-native project and is open source. Use KICS by Checkmarx to identify security flaws, legal compliance problems, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code.

How it Works

KICS’s built-in extensibility is what makes it so strong and well-liked. Achieving this extensibility entails:

Queries are fully flexible and changeable heuristic rules. These are simple to alter, expand upon, and include.

a robust but still straightforward architecture that makes it simple to add support for new Infrastructure as Code solutions quickly.

KICS was developed using Open Policy Agent and is entirely open source (OPA).

Rego was a natural choice as a query language to implement security queries, while Golang’s speed, simplicity, and dependability made it the ideal choice for creating KICS.

For AWS, GCP, Azure, and other cloud providers, we have created more than a thousand ready-to-use queries that cover a wide range of vulnerabilities checks.

High-Level Architecture

KICS’s extendable pipeline of IaC language parsers and pluggable architecture make it simple to incorporate additional IaC languages and queries.

A command-line interface, parser, queries execution engine, IaC providers, security queries, and results writer are the key parts of KICS at a high level.

  • Provides CLI input to KICS using the command line interface.
  • The parser is in charge of processing the input IaC files (terraform and others)
  • Providers of IaC => IaC language is transformed into a normalised JSON \sQueries Execution Engine: uses pre-built REGO queries for each security and misconfiguration against normalised JSON Security Queries.
  • Writer => Outputs data in JSON format.

Execution Flow

R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 week ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 week ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago