layout | published | title | nav_order |
---|---|---|---|
default |
true |
Contribution Overview |
1 |
Checkov users are encouraged to contribute their custom Policies to help increase our existing IaC coverage. Our aim is to help close gaps in real-world hardening, assessments, auditing and forensics. In other words, we specifically encourage contribution of new Policies that you think should be globally accepted when provisioning and changing infrastructure.
The main aspects of contributing new Policies are:
- Preparing the prerequisites
- Creating and Testing the Custom Policy (either YAML or Python format)
- Pull Request
First, make sure you installed and configured Checkov correctly. If you are unsure, go back and read the Installing Checkov documentation.
Preferably by now you have either scanned a folder containing Terraform state-files or went ahead and integrated Checkov as part of your CI/CD pipeline.
Let's assume we're trying to create a new AWS resource Check to ensure all of our aws_iam_policy
's have a tag that says { "Checkov" = "IsAwesome" }
-
Run
checkov --add-check
-
Answer the prompts
$ checkov --add-check _ _ ___| |__ ___ ___| | _______ __ / __| '_ \ / _ \/ __| |/ / _ \ \ / / | (__| | | | __/ (__| < (_) \ V / \___|_| |_|\___|\___|_|\_\___/ \_/ By Prisma Cloud | version: ... What action would you like to take? (add) [add]: add Enter the title of your new check (without a .py) [MyNewTest]: CheckovIsAwesomeTag Select a category for this check (application_security, backup_and_recoveryconvention, encryption, general_security, iam, kubernetes, logging, networking, secrets) [iam]: general_security Describe what this check does [Ensure that X does Y...]: Makes sure that aws_iam_policy resources have a tag that says {'Checkov' = IsAwesome'} What kind of check would you like to add? (terraform) [terraform]: terraform Select the cloud provider this will run on (azure, aws, gcp) [aws]: aws Select a terraform object for this check (data, provider, resource) [resource]: resource Enter the terraform object type [aws_iam_policy]: aws_iam_policy Please ensure you are at the root of the Checkov repository before completing this prompt Creating Check CheckovIsAwesomeTag.py in /path/to/checkov/checkov/terraform/checks/resource/aws Successfully created /path/to/checkov/checkov/terraform/checks/resource/aws/CheckovIsAwesomeTag.py Creating Unit Test Stubs for CheckovIsAwesomeTag in /path/to/checkov/tests/terraform/checks/resource/aws Successfully created /path/to/checkov/tests/terraform/checks/resource/aws/example_CheckovIsAwesomeTag/CheckovIsAwesomeTag.tf Successfully created /path/to/checkov/tests/terraform/checks/resource/aws/test_CheckovIsAwesomeTag.py Next steps: 1) Edit your new check located in the checks/ directory listed above 2) Add both a PASS and FAIL unit test to the newly created unit test under the tests/ directory to show others how to fix failures
-
Go to your new Check at
/path/to/checkov/checkov/terraform/checks/resource/aws/CheckovIsAwesomeTag.py
-
Edit the
scan_resource_conf()
function to look like the following:def scan_resource_conf(self, conf): if 'tags' in conf.keys(): tags = conf['tags'][0] if "Checkov" in tags: if tags["Checkov"] == "IsAwesome": return CheckResult.PASSED return CheckResult.FAILED
-
Go to your new Unit Test Terraform at
/path/to/checkov/tests/terraform/checks/resource/aws/example_CheckovIsAwesomeTag/CheckovIsAwesomeTag.tf
-
Edit the terraform resources to contain the following:
## SHOULD PASS: Contains {Checkov: IsAwesome} key/value resource "aws_iam_policy" "ckv_unittest_pass" { tags = { "Checkov" = "IsAwesome" } } ## SHOULD FAIL: Value does not equal "IsAwesome" resource "aws_iam_policy" "ckv_unittest_fail" { tags = { "Checkov" = "IsLame" } }
-
Run your tests
pytest -k test_CheckovIsAwesomeTag
$ pytest -k test_CheckovIsAwesome ================================================================================ test session starts ================================================================================ platform darwin -- Python 3.7.11, pytest-6.2.5, py-1.10.0, pluggy-1.0.0 rootdir: /path/to/checkov plugins: xdist-2.4.0, forked-1.3.0, cov-3.0.0 collected 1952 items / 1951 deselected / 1 selected tests/terraform/checks/resource/aws/test_CheckovIsAwesomeTag.py . [100%] ======================================================================== 1 passed, 1951 deselected in 7.16s =========================================================================
-
Let's add another unit test for a missing tag:
## SHOULD PASS: Contains {Checkov: IsAwesome} key/value resource "aws_iam_policy" "ckv_unittest_pass" { tags = { "Checkov" = "IsAwesome" } } ## SHOULD FAIL: Value does not equal "IsAwesome" resource "aws_iam_policy" "ckv_unittest_fail" { tags = { "Checkov" = "IsLame" } } ## SHOULD FAIL: Missing "Checkov" tag resource "aws_iam_policy" "ckv_unittest_fail_1" { tags = { "SomethingElse" = "IsAwesome" } }
-
Run your tests again
pytest -k test_CheckovIsAwesomeTag
... self.assertEqual(summary['passed'], len(passing_resources)) > self.assertEqual(summary['failed'], len(failing_resources)) E AssertionError: 2 != 1 tests/terraform/checks/resource/aws/test_CheckovIsAwesomeTag.py:33: AssertionError ============================================================================== short test summary info ============================================================================== FAILED tests/terraform/checks/resource/aws/test_CheckovIsAwesomeTag.py::TestCheckovIsAwesomeTag::test - AssertionError: 2 != 1 ======================================================================== 1 failed, 1951 deselected in 7.40s =========================================================================
-
We failed! Let's fix it. Go to our new Unit Test file
/path/to/checkov/tests/terraform/checks/resource/aws/test_CheckovIsAwesomeTag.py
-
Notice lines 23-25. Right now, we are configured to only have one failing resource
'aws_iam_policy.ckv_unittest_fail'
-
Edit
failing_resources
to include our newly added Terraform resource:... passing_resources = { 'aws_iam_policy.ckv_unittest_pass' } failing_resources = { 'aws_iam_policy.ckv_unittest_fail', 'aws_iam_policy.ckv_unittest_fail_1' # <-- Add this line! } ...
-
Run your tests again
pytest -k test_CheckovIsAwesomeTag
$ pytest -k test_CheckovIsAwesome ================================================================================ test session starts ================================================================================ platform darwin -- Python 3.7.11, pytest-6.2.5, py-1.10.0, pluggy-1.0.0 rootdir: /Users/joseph.meredith/dev/jmeredith18/checkov plugins: xdist-2.4.0, forked-1.3.0, cov-3.0.0 collected 1952 items / 1951 deselected / 1 selected tests/terraform/checks/resource/aws/test_CheckovIsAwesomeTag.py . [100%] ======================================================================== 1 passed, 1951 deselected in 6.90s =========================================================================
-
Go make your own Checks, test them, and contribute!
Each check consists of the following mandatory properties:
name: A new Custom Policy's unique purpose. It should ideally specify the positive desired outcome of the policy.
ID: A mandatory unique identifier of a policy. Policies written by Checkov maintainers follow the following convention: CKV_providerType_serialNumber. (e.g., CKV_AWS_9 , CKV_GCP_12)
Categories: A categorization of a scan. This is usually helpful when producing compliance reports, pipeline analytics and health metrics. Check out our existing categories before creating a new one.
When contributing a Custom Policy, please increment the ID number to be x+1, where x is the serial number of the latest implemented Custom Policy, with respect to its provider (e.g., AWS).
A more specific type of Custom Policy may also include additional attributes. For example, a check that scans a Terraform resource configuration also contains the supported_resources attribute, which is a list of the supported resource types of the check.
The result of a scan should be a binary result of either PASSED or FAILED. We have also included an UNKNOWN option, which means that it is unknown if the scanned configuration complied with the check. If your check could have edge cases that might not be supported by the scanner’s current logic, consider support the UNKNOWN option.
Additionally, a Policy can be suppressed by Checkov on a given configuration by inserting a skip comment inside a specific configuration scope. Then, the result for that Policy would be SKIPPED. For further details, see Suppressions.
Identify which IaC type the check will test. Currently, Checkov can scan either Terraform or CloudFormation configuration files.
Place your code in the checkov/<scanner>
folder, where <scanner>
is either terraform
or cloudformation
.
Identify which IaC type will be tested under the Custom Policy. Currently, Checkov scans either Terraform or CloudFormation configuration files. Place your code in the checkov/<scanner>
folder, where <scanner>
is either terraform or cloudformation.
Custom Policies are divided first into folders grouped by type, and then grouped by provider.
Custom Policies should relate to a common IaC configuration type of a specific public cloud provider. For example, a Custom Policy that validates the encryption configuration of an S3 bucket is considered to be of type resource
, and of aws
provider.
Identify the type and provider of the new Custom Policy in order to place it correctly under the project structure. For example, the mentioned above check is already implemented in Checkov under checkov/terraform/checks/resource/aws/S3Encryption.py
.
Notice that Custom Policies are divided into folders grouped by type, and then grouped provider.
If available, please provide the official Terraform or CloudFormation documentation of the checked configuration. This helps users to better understand the Custom Policy's scanned configuration and usage.
For example, the documentation for the Custom Policy mentioned above is here.
In order to develop the Custom Policy, a relevant example configuration should be presented as an input to Checkov. Provide a sample configuration (e.g., example.tf
, template.json
) that contains both passing and failing configurations with respect to the Custom Policy's logic. The file can be served as an input to the appropriate Custom Policy's unit tests.
- See Create Python Policies and Contribute Python-Based Policies.
- See Create YAML Policies and Contribute YAML-Based Policies.
Open a PR that contains the implementation code and testing suite, with the following information:
- Custom Policy
id
. - Custom Policy
name
. - Custom Policy IaC type.
- Custom Policy type and provider.
- IaC configuration documentation (If available).
- Sample Terraform configuration file.
- Any additional information that would help other members to better understand the check.