Xygeni User Guides
  • Welcome to Xygeni
  • Getting Started
    • Create a Free Trial Account
    • Quick start with your code repository
    • Quick start with Xygeni CLI
    • Quick start with a preloaded project
    • Log in to Xygeni
    • Subscribe to Xygeni
  • Introduction to Xygeni
    • Key Concepts
      • Projects in Xygeni
      • Project Baseline
      • Detected Issues
      • Remediation Actions
      • Policies
      • Risk Level
      • SDLC Inventory
      • Standards Compliance
      • GuardRails
    • Xygeni Products
    • How Xygeni works
    • Xygeni Web UI Overview
      • Projects Screen
        • Risk Level
    • Integrating Xygeni into your Workflow
    • Prioritization Funnels
      • Custom Funnels
      • Prioritization Criteria (Stages)
        • Reachability
        • Exploitability
        • Fixable
    • Guardrails
    • Generate a SBOM
    • Reports
      • Trends
      • Scan History
    • Supported Integrations
    • Customizations
  • Xygeni Products
    • Application Security Posture Management (ASPM)
      • ASPM User Interface Guide
      • All Risks
        • Statistics
        • Issues Evolution
        • Issue Comparison Between Different Scans
      • Governance
      • Inventory
        • All Assets
        • Repositories
        • Components
        • CI/CD Assets
        • Delivery Assets
        • Systems & Tools
        • Collaborators
      • Health Check
      • Inventory Scanner
        • Inventory Scanner Configuration
        • Inventory Collaborators Scan
      • Importing reports from 3rd party tools
        • External Scanners Supported
          • Report upload for Kiuwan
            • ExportRule (.java)
    • Code Security (SAST)
      • Code Security (SAST) User Interface Guide
        • Risks (SAST)
        • Malicious Code
      • Malware Scanner
        • Malware Scanner Configuration
        • Malware Detectors
      • SAST Scanner
        • SAST Scanner Configuration
    • Open Source (SCA)
      • Open Source (SCA) User Interface Guide
      • Open Source Components
      • Supported Package Managers for dependency resolution
      • Risks (SCA)
      • OSS Prioritization Funnels
      • OSS Auto-Remediation
      • Malware Early Warning (MEW)
        • How Malware Early Warning works
        • Common types of Malware found in open source packages
      • Dependency Scanner
        • Dependency scanner configuration
        • Dependency Analyzers
      • Suspect Dependencies Scanner
        • Suspect Deps Scanner Configuration
        • Suspect Deps Detectors
    • CI/CD Security
      • CI/CD Security User Interface Guide
      • CI/CD Details
      • Build Attestations
      • CI/CD Scanner
        • CI/CD Misconfigurations Scanner Configuration
      • Compliance Scanner
        • Supported compliance standards
    • Secrets Security
      • Secrets User Interface Guide
      • Secrets Scanner
        • Secrets scanner configuration
      • Secret Leaks Handling
        • Secret Leaks Handling
        • How to Prevent Hard-Coded Secrets
        • Secret Leaks Handling CheatSheet
      • Secrets Auto-Remediation
    • IaC Security
      • IaC User Interface Guide
      • IaC Scanner
        • IaC Scanner Configuration
    • Malware
    • Build Security
      • Build Security Concepts
      • Build Attestations
      • Attestation format
      • How SALT works
      • Installing Salt CLI
      • Salt Command-Line Reference
      • SALT Architecture
      • SALT How To…​
    • Anomalous Activity Detection
      • Anomalous Activity Detection User Interface Guide
      • Xygeni Sensors
        • Xygeni Sensor for Azure
        • Xygeni Sensor for BitBucket
        • Xygeni Sensor for GitHub
          • GitHub Audit Log Processing
        • Xygeni Sensor for GitLab
        • Xygeni Sensor for Jenkins
        • Anomaly Detection's Detectors
      • Code Tampering Scanner
        • Code Tampering Scanner Configuration
    • Compliance & Malware Insights
      • SSCS Compliance
      • Malicious Packages DB
  • Scan Management
    • Manage Scans
    • Scan History
  • Xygeni Scanner CLI
    • Xygeni Scanners
    • Xygeni CLI Overview
      • Xygeni CLI Prerequisites
      • Xygeni CLI Installation
      • Xygeni CLI Docker Image
      • Xygeni CLI Authentication
        • CLI Authentication with Xygeni
      • SCM, CI/ CD and Container Registry tokens
      • Xygeni CLI Operation Modes
        • Single scan
          • Scanning a docker image
        • Multi Scan
        • Organization scan
      • Xygeni CLI Configuration options
      • Xygeni CLI Output Formats
      • Exporting Xygeni results to 3rd party tools
      • Automatic Remediation
      • Generate SBOM with the Xygeni CLI
      • CLI utils
        • Credentials Encryption
        • Central Configuration
      • Xygeni Guardrails
        • CI/CD Audit Analysis
      • Xygeni CLI Error Codes
      • Xygeni Scanner Reference
  • Xygeni Administration
    • Platform Administration
      • Profile
      • Subscription
      • Users Management
      • Projects Management
      • Groups Management
      • Policies
      • Integrations
        • Xygeni Single Sign-On (SSO) Authentication
          • SSO - OKTA
          • SSO - Microsoft Entra ID
        • Integrate Scanner CLI into CI/CD Systems
          • Azure Pipelines Integration
          • BitBucket Integration
          • CircleCI Integration
          • GitHub Actions Integration
          • GitLab Runner Integration
          • Jenkins Integration
          • Travis CI Integration
        • Git Hooks with Xygeni
        • Collaboration & communication Tools
        • Ticketing Systems
        • Remediation systems
      • Notifications
    • Rest API
  • Support
  • Changelog
    • Version 5.11 - April 11, 2025
    • Version 5.9 – March 26, 2025
Powered by GitBook
On this page
  • Secure Your Infrastructure Automation with Precision
  • Detect Any Cloud Misconfigurations
  • Integrated CI/CD Security and Adaptable Scanning
  • Automated Policy Enforcement
  • Adaptable Scanning Capabilities
  • Comprehensive Support for Major Frameworks
  • Comprehensive and Flexible Container Image Scanning
  • Block IaC Misconfigurations Before Production
Export as PDF
  1. Xygeni Products

IaC Security

PreviousSecrets Auto-RemediationNextIaC User Interface Guide

Last updated 8 months ago

Secure Your Infrastructure Automation with Precision

Infrastructure-as-Code (IaC) is a method to provision and manage IT/Cloud infrastructure through the use of source code (IaC templates) under version control, rather than through operating procedures and manual processes.

Errors in IaC templates could lead to security issues across the cloud native application stack.

Maximize the reliability and security of your infrastructure as code processes. Our advanced IaC solution ensures that your automated configurations are not only efficient but protected against vulnerabilities from development to deployment.

Detect Any Cloud Misconfigurations

Xygeni’s platform efficiently identifies and mitigates cloud misconfigurations across various IaC templates, including Terraform, CloudFormation, and Azure Resource Manager (ARM), ensuring your cloud infrastructure is secured against common and complex vulnerabilities.

Integrated CI/CD Security and Adaptable Scanning

Xygeni integrates seamlessly with your CI/CD pipelines, providing real-time alerts and halting problematic deployments. Here are several ways to incorporate Xygeni’s IaC scanning capabilities:

  • Incorporate Xygeni’s scanning as a pre-commit hook in Git to automatically check for IaC flaws before code is committed. This ensures that any potential issues are addressed at the earliest stage of development.

  • Integrate Xygeni scans into your CI/CD pipelines using popular CI tools like Jenkins, CircleCI, or GitHub Actions. Configure the scan to run at key stages, such as before a merge request is accepted or before deployment to production.

Automated Policy Enforcement

Deploy extensive, predefined policies to automatically address major security challenges like infrastructure misconfigurations, container vulnerabilities, and exposed secrets, simplifying cloud security without additional effort.

Adaptable Scanning Capabilities

Xygeni’s scanning tools are designed to adapt to various environments and configurations, allowing scans of both private and public registries, local file systems, and different container formats. This adaptability ensures comprehensive security coverage regardless of your infrastructure’s complexity or scale.

Comprehensive Support for Major Frameworks

  • Terraform: We provide detectors for a wide range of resources across major cloud providers such as AWS, Azure, and Google Cloud, making it ideal for cloud-agnostic infrastructure setups.

  • CloudFormation: Managed AWS service integration allows for detailed modeling and provisioning of AWS resources.

  • ARM and Bicep: Tools for Azure resources, ranging from traditional ARM templates to the newer, more developer-friendly Bicep syntax.

  • Kubernetes: Whether using basic Pods syntax or complex Helm charts, Xygeni ensures your Kubernetes deployments are secure.

  • Docker: Our security extends to Docker environments, including Dockerfiles and docker-compose files that define services, networks, and volumes.

Comprehensive and Flexible Container Image Scanning

  • Local Docker Engine: Directly from the installed Docker engine.

  • Containerd: Via the Containerd daemon or nerdctl.

  • Podman: Using the Podman CLI.

  • Remote OCI Registry: Directly from OCI-compliant registries or specified via tarball: for local OCI format images.

Block IaC Misconfigurations Before Production

By incorporating best practices and security guardrails directly into development workflows, Xygeni prevents noisy and redundant alerts, ensuring only relevant issues are flagged. This proactive approach blocks IaC misconfigurations before they reach production, maintaining the integrity and security of your deployments.

Pre-Commit Hooks (see )

CI/CD Pipeline Integration (see )

Xygeni enhances container security by detecting , vulnerabilities, and secrets. Xygeni can pull images from multiple sources for scanning:

See and

Git Hooks with Xygeni
Integrate into CI/CD Systems
Infrastructure-As-Code
IaC Scanner
container image misconfigurations