CI Integration
Integrate CyRook security scans into your CI/CD pipeline. Gate deployments based on security posture.
What is CI Integration?
CI Integration allows you to run CyRook security scans as part of your CI/CD pipeline. You can gate deployments based on security posture, ensuring that only secure code is deployed to production.
Trigger CI Scan
Run a security scan from CI. Results will be available for policy checking.
GitHub Actions Setup
Add CyRook security scans to your GitHub Actions workflow
1. Add Secrets
Add the following secrets to your GitHub repository:
CyRook_API_KEY- Your CyRook API keyCyRook_TARGET_URL- The URL to scan
2. Add Workflow File
Create .github/workflows/CyRook.yml with:
name: CyRook Security Scan
on:
push:
branches: [ main, master ]
pull_request:
branches: [ main, master ]
jobs:
security-scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: Run CyRook Security Scan
uses: CyRook/action@v1
with:
target_url: ${{ secrets.CyRook_TARGET_URL }}
environment: production
mode: external
env:
CyRook_API_KEY: ${{ secrets.CyRook_API_KEY }}How CI Integration Works
1. Add Workflow
Add the CyRook GitHub Action to your workflow file.
2. Run Scan
The scan runs automatically on every push and pull request.
3. Policy Check
CyRook checks your security posture against configured policies.
4. Gate Deployment
If the scan fails policy checks, the CI pipeline fails and deployment is blocked.