If you are using the GitLab pipeline for development automation, you can integrate it with Bright to run security scans on every new build within your development environment.

Depending on the use case, you can apply multiple options for running scans from your CI pipeline.

Use Cases

Scanning a Target in a Private Environment

You can run fast scans of the application which is currently under development within your pipeline. Bright allows you to follow the fail-fast principle by interrupting a scan automatically at the first detected vulnerability. Using this option, you are able to quickly and timely find and fix the security issues at the build level without delaying the whole development process.

As the scan target is closed within your pipeline, Bright engine cannot access it directly from the cloud. In this case, you can use a Repeater which serves as a request-proxy between Bright and a scan target inside your private environment. You should first register (create) the Repeater in the Bright app, and then connect it to your pipeline using the generated Repeater ID.

To run scans directly from your pipeline, you need to install the Bright CLI. It provides an easy-to-use interface and multiple commands you can use in your Travis flow.

You can either run the Bright CLI with a Repeater using the NPM or by installing the Bright's Docker image inside your pipeline.

Find the examples here:

 

 

Scanning a Target in a Public Environment

Upon a release of a new build, you can run an overall complete scan of the target in the production or public pre-production environment. In this case, long scans will not interfere with the development process as compared to scanning in the private environment.

Depending on the access to the deployed target, you can run a scan using multiple options.

  • If the scan target is accessible from the Internet:

    Directly from the Bright app
    From your pipeline using the Bright CLI (NPM). Find the example here.

 

14351435

 

  • If the scan target has a private access (or if you want to scan specific local microservices), you can use a Repeater (scam t) to ensure secure communication between Bright and the target. In this case, you can control scanning only via the Bright CLI which can be installed using either the NPM or the Docker image.

 

 

Find the examples here:


Did this page help you?