# Run Your First Security Pipeline

This tutorial will help you to run your first security pipeline. Before that, we will learn some terminologies.

**🔓 A vulnerability is a weakness in a system or software that can be exploited by attackers to compromise security.**

Let’s get started, Pre-Requisites required before running a pipeline,\
\
Let’s get started,\
Pre-Requisites required before running a pipeline,\
How to run your first pipeline: Link\
How to create a provider: Link

&#x20;

Hope you learned how to create a pipeline and run it! Let's go to the next step,\
\
\
In our task and pipeline catalog, we support many scanning tools such as **trivy**, **sonarQube**, **snyk,** and many more. To run a security pipeline integrate these tasks in your pipelines and run it. How simple is that? I will show how it is done in the next step with a detailed explanation.\
\
SCA (Software Composition Analysis): Identifies and manages open-source and third-party components in software to detect vulnerabilities and ensure compliance.

SAST (Static Application Security Testing): Analyzes source code without executing it to identify vulnerabilities and weaknesses in the early stages of development.

DAST (Dynamic Application Security Testing): Tests running applications for vulnerabilities by simulating attacks from outside the application.

IAC (Infrastructure as Code) Scanning: Reviews infrastructure code to identify security vulnerabilities and compliance issues before deployment.<br>

<figure><img src="https://3829750647-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FAObcOkMb6sCSnSdcUOTm%2Fuploads%2F9vGTeQf2wuzOr6D56PyH%2Fimage-20240507-031429.png?alt=media&#x26;token=afb0a22a-d457-4ecb-ac4e-7b3e1c37ac50" alt=""><figcaption></figcaption></figure>

In the security dashboard, we have **scans** that show all vulnerabilities and **policies** (Global level, Cluster level, Environment level, Microservice level) for setting up some predefined rules. Don’t worry we got your back, let me show you an example.

\
**For example:** After scanning we get vulnerabilities (i.e. critical, high, medium, and low). Let’s say we set permission for critical vulnerabilities as a block then in the future when we run the pipeline and if scanning tools find **critical vulnerabilities** in the pipeline then the pipeline fails. Suppose if we allow **all the vulnerabilities** then, even if scanning tools find all the vulnerabilities the pipeline will not fail because we have allowed them.<br>

<figure><img src="https://3829750647-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FAObcOkMb6sCSnSdcUOTm%2Fuploads%2FrdIwXvQieinjlJssZlFD%2Fimage-20240507-050159.png?alt=media&#x26;token=40e19637-4bbd-4ad0-9776-26606eed8d31" alt=""><figcaption></figcaption></figure>

Now we have covered all the terminologies in the aspect of security. good work till now. let's move to the next step.<br>

<figure><img src="https://3829750647-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FAObcOkMb6sCSnSdcUOTm%2Fuploads%2FegBpKy6t3X4O5WrKjzVH%2Fimage-20240507-073127.png?alt=media&#x26;token=8c789871-4a01-47e6-9625-a096da5ee3b2" alt=""><figcaption></figcaption></figure>

As you can see in pipeline templates, there is a pipeline template called to **build and deploy with DevSecOps.** If we open that we can see all categories here from SAST, SCA, DAST to IAC at various stages. How cool is this! you don't even have to create a pipeline we have covered most of the\
use cases in our catalog. If you still want to create a pipeline then we have these scanning tools in the form of tasks you can use them<br>

<figure><img src="https://3829750647-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FAObcOkMb6sCSnSdcUOTm%2Fuploads%2FoYxgylkNI098NZL8nnPK%2Fimage-20240507-073655.png?alt=media&#x26;token=7efd1ad2-72ff-41bc-9a78-fc6d8a9c52a9" alt=""><figcaption></figcaption></figure>

Run the above pipeline. That’s it done ✅ great job…👏

<figure><img src="https://3829750647-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FAObcOkMb6sCSnSdcUOTm%2Fuploads%2FbitNf84vHA2kfsMcbKDL%2Fimage-20240507-075657.png?alt=media&#x26;token=ad795b61-4b1d-43f8-ac8e-2f214cbdf91b" alt=""><figcaption></figcaption></figure>

Now click on build and deploy with devsecops. Checkout **Logs**, **Results** **for** **SBOM**’s, and the **Security** section for vulnerabilities.

SBOM, or Software Bill of Materials, is a detailed inventory listing of all components used in a software product.

( spdx and cyclonedx are formats )SPDX is a standard for documenting and exchanging software package metadata, while CycloneDX is a lightweight SBOM specification designed for easy integration into modern CI/CD pipelines.\
\
**LOGS:** In logs, you can check for the vulnerability list as shown below. Even you can check if scanned by **sonarQube**.<br>

<figure><img src="https://3829750647-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FAObcOkMb6sCSnSdcUOTm%2Fuploads%2F7oYPDSIxsYBXMqEuUNY9%2Fimage-20240507-080453.png?alt=media&#x26;token=65441ae2-f01f-4ae0-9bfd-b5cd76b38517" alt=""><figcaption></figcaption></figure>

**RESULTS:** In results, you can check for **SBOM** reports.

<figure><img src="https://3829750647-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FAObcOkMb6sCSnSdcUOTm%2Fuploads%2FT2mulHWaBWbKiqTrR6PM%2Fimage-20240507-085512.png?alt=media&#x26;token=a7cff037-15ed-40f4-b3d9-99cc679d8fb3" alt=""><figcaption></figcaption></figure>

**SECURITY:** In security, you can see all information regarding **vulnerabilities** such as vulnerabilityID, severity, package, microservices etc.\ <br>

<figure><img src="https://3829750647-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FAObcOkMb6sCSnSdcUOTm%2Fuploads%2F120b7CXU7Nuon1gqM4Iu%2Fimage-20240507-085601.png?alt=media&#x26;token=3e8b439e-7a05-423e-a63e-afe74f2890ee" alt=""><figcaption></figcaption></figure>

You can just click on the links of vulnerability to fix it as shown below.

<figure><img src="https://3829750647-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FAObcOkMb6sCSnSdcUOTm%2Fuploads%2FrDWJaiAMaep2veu60lyD%2Fimage-20240507-090001.png?alt=media&#x26;token=4f6536f9-bcf4-4b6e-bd73-f254be223035" alt=""><figcaption></figcaption></figure>

Wow 🤩, you made it. you not only learned how to run a pipeline with security Integration but also learned the core concept of DevSecOps.
