Infrastructure50 items
CI/CD Pipeline Security Checklist
An end-to-end checklist for assessing software-delivery pipelines as the high-impact attack surface they are. Walks through source, build, and deploy stages; OIDC and signed-attestation posture; and SBOM / supply-chain controls.
Mapped to the OWASP Top 10 CI/CD Security Risks (CICD-SEC-1 through CICD-SEC-10), the SLSA framework, and NIST SP 800-204D.
OWASP Top 10 CI/CD Security RisksSLSA FrameworkNIST SP 800-204D
Progress: 0 of 50 items
0%
Evidence to capture
Pipeline inventory spreadsheet
References
Commands
aws iam get-role --role-name <role> --query Role.AssumeRolePolicyDocumentReferences
Commands
gh api repos/OWNER/REPO/branches/main/protection | jqCommands
gh secret list --org ORGgh secret list -R OWNER/REPOReferences
References
Commands
trufflehog git https://github.com/OWNER/REPO --since-commit HEAD~5000gitleaks detect --source . --redactReferences
Commands
rg "uses: [^@]+@v[0-9]" .github/workflows/References
Commands
gh api repos/OWNER/REPO/branches/main/protection/required_signaturesCommands
gh api orgs/ORG/installations | jq '.installations[].app_slug'References
Commands
npm view <internal-package-name>pip index versions <internal-package-name>References
Commands
rg "\$\{\{ ?(github\.event|env)\." .github/workflows/Commands
trivy image <image>:<tag> --severity HIGH,CRITICAL --exit-code 1syft <image>:<tag> -o cyclonedx-jsonReferences
Commands
cosign verify --certificate-identity-regexp ".*" --certificate-oidc-issuer-regexp ".*" <image>References
Commands
gh attestation verify --owner OWNER <artifact>Commands
aws iam get-role --role-name <role> --query Role.AssumeRolePolicyDocumentCommands
gh api repos/OWNER/REPO/environments/productionCommands
gitleaks detect --source ./deployCommands
kubectl get clusterpolicies -o jsonpath='{range .items[*]}{.metadata.name}{": "}{.spec.validationFailureAction}{"\n"}{end}'References
References
References
References