Comprehensive security design review checklist for Jenkins, GitHub Actions, AWS, and Azure pipelines. This repository helps teams audit software supply chain controls and cloud hardening posture before production releases.
- What it does
- Who it is for
- Repository Structure
- Install
- Quick Start
- Scoring Model
- Examples
- Limitations
- Roadmap
- Security
- License
This repository offers a structured checklist to audit CI/CD pipeline security and cloud security configuration. It standardizes design reviews with explicit control IDs, priorities, and expected evidence.
- DevOps Engineers hardening build servers and deployment paths.
- Cloud Security Architects conducting design and threat reviews.
- Release Managers validating deployment gates and risk acceptance.
cicd-cloud-security-checklist/
|-- .github/
| |-- ISSUE_TEMPLATE/
| | |-- security_gap_report.md
|-- docs/
| |-- scoring-model.md
|-- examples/
| |-- aws_s3_bucket_policy.json
| |-- github_actions_secrets.yaml
|-- templates/
| |-- assessment-template.yaml
|-- checklist.yaml
|-- CHANGELOG.md
|-- CONTRIBUTING.md
|-- LICENSE
|-- README.md
|-- SECURITY.md
Clone the repository to integrate the checklist into your review process.
git clone https://github.com/obsTR/cicd-cloud-security-checklist.git- Use
checklist.yamlas the control baseline. - Copy
templates/assessment-template.yamlfor each pipeline/system under review. - Mark each control as
PASS,FAIL, orWAIVEDwith evidence links. - Calculate score using
docs/scoring-model.md. - Track unresolved gaps as issues using
.github/ISSUE_TEMPLATE/security_gap_report.md.
The default weighted model is documented in docs/scoring-model.md and aligned with control priority (Critical, High, Medium, Low).
- AWS S3 verification: explicit deny controls and TLS enforcement (
examples/aws_s3_bucket_policy.json). - GitHub Actions hardening: least-privilege permissions and OIDC usage (
examples/github_actions_secrets.yaml).
- This is a design-review and governance tool.
- It does not replace automated SAST, DAST, IaC scanning, or runtime detection tooling.
- Automate checklist validation with OPA (Open Policy Agent).
- Add GCP (Google Cloud Platform) specific controls and examples.
- Publish a CLI for automated control scoring and trend tracking.
Please report vulnerabilities via SECURITY.md.
Distributed under the MIT License.