Kali Linux

kics : Find security vulnerabilities, compliance issues, and infrastructure misconfigurations

KICS, which stands for Keeping Infrastructure as Code Secure, is an essential component of every cloud-native project and is open source. Use KICS by Checkmarx to identify security flaws, legal compliance problems, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code.

How it Works

KICS’s built-in extensibility is what makes it so strong and well-liked. Achieving this extensibility entails:

Queries are fully flexible and changeable heuristic rules. These are simple to alter, expand upon, and include.

a robust but still straightforward architecture that makes it simple to add support for new Infrastructure as Code solutions quickly.

KICS was developed using Open Policy Agent and is entirely open source (OPA).

Rego was a natural choice as a query language to implement security queries, while Golang’s speed, simplicity, and dependability made it the ideal choice for creating KICS.

For AWS, GCP, Azure, and other cloud providers, we have created more than a thousand ready-to-use queries that cover a wide range of vulnerabilities checks.

High-Level Architecture

KICS’s extendable pipeline of IaC language parsers and pluggable architecture make it simple to incorporate additional IaC languages and queries.

A command-line interface, parser, queries execution engine, IaC providers, security queries, and results writer are the key parts of KICS at a high level.

  • Provides CLI input to KICS using the command line interface.
  • The parser is in charge of processing the input IaC files (terraform and others)
  • Providers of IaC => IaC language is transformed into a normalised JSON \sQueries Execution Engine: uses pre-built REGO queries for each security and misconfiguration against normalised JSON Security Queries.
  • Writer => Outputs data in JSON format.

Execution Flow

R K

Recent Posts

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

15 hours ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

17 hours ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

19 hours ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

19 hours ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

19 hours ago

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

2 days ago