Skip to content

Security: Bhagirath00/OpsGuard

Security

SECURITY.md

Security

Note: This is a demonstration/portfolio project showcasing DevSecOps practices. The AWS infrastructure has been decommissioned.

Security Best Practices Implemented

This project demonstrates enterprise-grade security patterns:

Container Security

  • ✅ Non-root container users
  • ✅ Read-only root filesystems
  • ✅ Dropped Linux capabilities
  • ✅ Multi-stage Docker builds (minimal attack surface)
  • ✅ Health checks for all containers

Kubernetes Security

  • ✅ SecurityContext with runAsNonRoot: true
  • allowPrivilegeEscalation: false
  • ✅ Dedicated ServiceAccounts per workload
  • ✅ Resource limits to prevent DoS
  • ✅ Pod anti-affinity for high availability

CI/CD Security (DevSecOps)

  • ✅ Trivy vulnerability scanning for images
  • ✅ Bandit static analysis for Python
  • ✅ Safety dependency vulnerability checks
  • ✅ SonarQube integration ready

Infrastructure Security

  • ✅ Terraform state encryption (S3)
  • ✅ DynamoDB state locking
  • ✅ RDS deletion protection
  • ✅ Private subnets for databases
  • ✅ Security group least-privilege design

Secrets Management

  • ✅ Environment variables via .env (gitignored)
  • ✅ Kubernetes Secrets (gitignored)
  • ✅ Sensitive Terraform variables marked sensitive = true

Local Development

When running locally, copy the example environment files:

cp .env.example .env
# Edit .env with your values

Never commit .env files or Kubernetes secrets to version control.

There aren’t any published security advisories