Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Security Automation with Ansible 2

You're reading from   Security Automation with Ansible 2 Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

Arrow left icon
Product type Paperback
Published in Dec 2017
Publisher Packt
ISBN-13 9781788394512
Length 364 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Akash Mahajan Akash Mahajan
Author Profile Icon Akash Mahajan
Akash Mahajan
MADHU AKULA MADHU AKULA
Author Profile Icon MADHU AKULA
MADHU AKULA
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Introduction to Ansible Playbooks and Roles FREE CHAPTER 2. Ansible Tower, Jenkins, and Other Automation Tools 3. Setting Up a Hardened WordPress with Encrypted Automated Backups 4. Log Monitoring and Serverless Automated Defense (Elastic Stack in AWS) 5. Automating Web Application Security Testing Using OWASP ZAP 6. Vulnerability Scanning with Nessus 7. Security Hardening for Applications and Networks 8. Continuous Security Scanning for Docker Containers 9. Automating Lab Setups for Forensics Collection and Malware Analysis 10. Writing an Ansible Module for Security Testing 11. Ansible Security Best Practices, References, and Further Reading

Automation security audit checks for applications using Ansible


Modern applications can get pretty complex fairly quickly. Having the ability to run automation to do security tasks is almost a mandatory requirement. 

The different types of application security scanning we can do can range from the following:

  1.  Run CI/CD scanning against the source code (for example, RIPS and brakeman).
  2. Dependency checking scanners (for example, OWASP dependency checker and snyk.io (https://snyk.io/)).

 

  1. Once deployed then run the web application scanner (for example, Nikto, Arachni, and w3af).
  2. Framework-specific security scanners (for example, WPScan and Droopscan) and many other.

Source code analysis scanners

This is one of the first and common way to minimize the security risk while applications going to production. Source code analysis scanner also known as Static Application Security Testing (SAST) will help to find security issues by analyzing the source code of the application. This kind of tools and testing...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime