Skip to content

CIS Publishes Guide to Integrate Qualys Vulnerability Scanning in CI/CD Pipelines

CIS's new guide simplifies Qualys integration in CI/CD pipelines. Learn how to enhance security in these systems with this versatile and detailed approach.

As we can see in the image there is a water pipe.
As we can see in the image there is a water pipe.

CIS Publishes Guide to Integrate Qualys Vulnerability Scanning in CI/CD Pipelines

The Center for Internet Security (CIS) has released a new guideline, 'Assess Vulnerabilities and Misconfiguration in CI/CD Pipelines'. The guide, published in response to requests for integration with various CI/CD pipelines, offers a comprehensive approach to integrating Qualys vulnerability scanning into these systems.

The guide, available in PDF format, includes a Postman collection for simulating API calls and understanding Qualys API query response data. It covers crucial aspects such as design considerations, API calls, response data structures, data processing, failure threshold settings, and success tips.

Notably, the guide provides a language-, tool-, and cloud-agnostic approach. This means it can be applied to a wide range of CI/CD pipelines, regardless of the specific technology stack used. The recent publication of the Golden AMI Pipeline integration with Qualys has sparked interest in similar integrations with other CI/CD pipelines.

The 'Assess Vulnerabilities and Misconfiguration in CI/CD Pipelines' guide, authored by CIS, is a valuable resource for integrating Qualys vulnerability scanning into CI/CD pipelines. It caters to a broad audience, offering a versatile and detailed approach to enhance security in these systems.

Read also:

Latest