In case you’re unfamiliar, AWS Marketplace is a curated, digital catalogue that helps customers around the globe find, buy, and use third-party software and services that run on AWS.
To purchase Checkmarx products via the Marketplace Private Offer, organizations can engage with a Checkmarx salesperson and receive product and pricing information not publicly visible on the Public Offer Marketplace. To purchase, all we need is the organization’s AWS Account Number to create a personalized quote. From there, acceptance, purchase, and deployment are just a few clicks away!
CxCodebashing, our developer application security training solution can be purchased both via Marketplace Private Offer and our public listing.
The benefits of purchasing Checkmarx solutions through AWS Marketplace include:
Checkmarx enables organizations to easily automate application security testing as part of their cloud-based software development process so they can improve the security and quality of their software without slowing down development, delivery, and deployment timelines. Checkmarx integrates with leading source code management tools like GitHub and GitLab to enable seamless code scanning within developers’ typical workflows.
Key features and benefits enjoyed by both developers and security teams include:
Robust DevOps Integrations:
Checkmarx provides integrated support for AWS CodeStar services, allowing customers to initiate Checkmarx application security testing scans from AWS CodeBuild and AWS CodePipeline for code that is stored in CodeCommit. Additionally, we have integrations with the industry’s top source control repositories, CI/CD pipelines, defect tracking, and feedback channels. With our CLI & REST APIs, we can integrate into virtually any other tool with ease.
Trusted and Backed by AWS:
Checkmarx is an AWS Advanced Program Network (APN) partner, AWS’ highest-tier technology partner. Additionally, Checkmarx is the first and only AppSec solutions vendor to possess both the AWS Security Competency and DevOps Competency status. The competency process involves AWS vetting, validating, and verifying Checkmarx’s deep industry experience, expertise, and track record of customer success and delivering specialized software.
Industry Leader Amongst Analysts and Customers:
Checkmarx has been named a “Leader” in the Gartner Magic Quadrant for Application Security Testing for three consecutive years, a testament to the quality of our solutions and value they bring to customers. We have also been recognized with the Gartner Peer Insights Customers’ Choice for Application Security Testing for two years running due to our overall product capabilities, seamless integration into DevOps, and expert customer service.
Checkmarx is proud to work with over 1,400 customers across the globe – ranging from Salesforce to Samsung – helping to improve the security and quality of the software they build. Just take it from one of our valued customers:
“If your company’s developer workforce is not used to incorporating security standards into their builds, the Checkmarx stack of tools will do wonders for you in terms of integrating into your existing pipelines and providing the education via Codebashing that your developers will need.” Application System Analyst, Finance Industry [read full review]
If you’re an AWS customer interested in purchasing Checkmarx’s AST solutions via AWS Marketplace, or want more information and assistance, please visit here.
]]>GitLab’s users, whether they are Software Developers, DevOps, or AppSec engineers, want to consume as much of the application security scanner’s results as possible within GitLab. GitLab is already a complete DevOps platform from managing -> to planning -> to creating -> to releasing, so it is just common sense GitLab users would want to have security directly within GitLab. GitLab users can consume Checkmarx security-related vulnerability results at three different integration points:
Every organization, even teams within the organization, will want to run security scanners at different points of the SDLC, but by best practice from Checkmarx, it is suggested to scan at the Merge Request stage. With security scanning completed at the Merge Request stage, an assessment can be performed with the scan results and the merge can be blocked, or GitLab Issues can be created. But, what kind of result data should be consumed?
Checkmarx provides:
Checkmarx maintains a spring boot application called CxFlow, which acts as a scan and results orchestration tool to automate security scans and integrate the results into CI/CD tools such as GitLab. Some key features and capabilities include:
Below is a visual picture of the Checkmarx workflow with GitLab’s CI/CD.
Now let’s describe this flow in more detail:
Variables are needed to perform Checkmarx authentication and to define Checkmarx scan settings read by CxFlow. This can be set up per project or by “groups”. GitLab has an awesome feature where you can have a file as a Variable. We leverage this feature and have CxFlow’s yaml configuration file as a Variable.
Per GitLab best practice, application security testing should be done during the “test” stage of the pipeline. During the test stage of the pipeline, GitLab will pull the Checkmarx docker container where CxFlow CLI is stored. CxFlow CLI should then be invoked to initiate the scan based on the settings defined in the config file Variable.
CxFlow receives the request with the Checkmarx project settings and the GitLab repository details. CxFlow performs the authentication into the Checkmarx server and then initiates a scan. It will wait for the scan to finish.
CxFlow waits until the scan is done, parses the results and will update the Security Dashboard, GitLab Issues, the Merge Request Discussion, or all three. If the issue has been fixed, it will automatically close it.
]]>