Code Security

To assess and scan your code at the earlier stages of development, you can use Check Point Code Security which brings CloudGuard security abilities to detect and prevent risk in cloud deployments into the CI/CD pipeline. Code Security provides one interface for various CI/CD security steps.

Code Security capabilities:

  • Scans your Infrastructure as Code (IaC) templates for risks

  • Checks your software for known vulnerabilities

  • Scans your collaboration and productivity tools

Your development team and/or DevSecOps team can use Code Security to scan:

Code Security focuses on scanning the text irrespective of programming language. It does this either directly or with the Code Security Toolchain which deals with unpacking and reading complex input sources. In addition, you can use Code Security in other different scenarios, for example:

  • Add Code Security to CI as a build step

  • Code Security scans your codebase with an ever-growing array of detectors

  • If matches are translated to findings (sensitive data, credentials, or other risks), Code Security can fail the build (or not) and pinpoints the problem

  • Provide a full report for tracing the finding to the source file and position for easy risk assessment and mitigation

You can also use SPEQL (proprietary mini-detector query language) to enrich Code Security built-in detectors with your security policies. When you configure new detectors, you check them in to the code repository. For more information, see Building Detectors.

Secure by Design

It minimizes the surface area of attack by:

  • Doing the right thing by default and having security-by-design. For example, Code Security never shows you secrets it found, it will just lead you there.

  • Code Security never communicates your private data with the outside world, ever

  • Code Security never stores, indexes, or offloads sensitive file contents to another place - in or out of your data centers (not even temporary files) - it does all the scanning in real time in-memory. This is why performance in Code Security is by design, to support security by design.

  • Code Security is built with a safe, compiled, borrow-checked, and a programming language that has proven itself to excel, and is widely adopted in the security domain: Rust. No scripting languages, no toy languages, no compromise.

Input

An input source is any folder that hosts files.

File systems:

  • Git repositories - pre-commit or on CI

  • Home folders (~) - protect entire desktops

  • Document folders - scanning legal documents

  • Cloud storage folders - scanning files stored on Dropbox, Google Drive, and so on

And artifacts, such as:

  • Container file systems - as a container security solution

  • Android apps - as app static analysis engine

  • Websites - as a remote scraping and monitoring security solution

  • Npm modules - as a build/production verification layer after pushing a new module to production

Detectors

A detector is a way to formulate a security best practice, detection of secrets, and a logical way to do security by design.

Code Security comes with a premium, high-grade array of detectors and it also allows and encourages you and your teams to add detectors to it.

By letting you write your own custom detectors, we want to empower your team to build various policies such as:

  • Identify and sanitize private customer IDs and data

  • Special home-brew secrets for internal systems

  • Employ policies such as "a test-only credit card with a certain pattern should only exist in the /examples folder"

For more information, see Building Detectors.

Zero Configuration

Code Security integrates with your existing environment with zero configuration (without any setup from your side):

Platforms

Code Security is a single binary (around 12 MB). It has no external dependencies, no OS dependencies, and no networking requirements.

It supports a binary for every major platform and has no problem to add new ones.

Binaries

Code Security can run on:

  • Linux (GNU + musl)

  • macOS

  • Windows

  • BSD

You can have Code Security run on every hardware, on-premises or cloud.