Setup a basic pipeline (use Jenkins) for generating a security report for DVNA.
The DVNA code should be downloaded from Github and then undergo static analysis.
As part of the project understand what is the tech stack for DVNA hence what potential static analysis tools can be applied here.
Once a static analysis is done the report should be saved.
Next, the DVNA should get deployed in a server.
Setup the infrastructure, required for the task, on 2 virtual machines running locally on a laptop. One VM contains the Jenkins and related infrastructure, and the second VM is for deploying the DVNA using the pipeline.
Do document extensively in markdown and deploy the documentation in a MkDocs website on the second VM.
Additionally, there was some inferred task to address in the problem statement:
To create a comparative report about how various SAST tools performed.
To create a webhook to trigger the build when a push event occurs on the project repository on GitHub.
Add onto Task 1 by implementing DAST in the pipeline for DVNA with OWASP ZAP and W3AF.
Make a report on the performance of the tools used to perform DAST by doing a comparative analysis of the results they provide.
Implement and use Semantic Versioning to tag versions of the documentation created as part of the tasks.
Append content for the task to the existing documentation from first task.
Perform commit-based checks on the source code for linting errors to improve code quality and generate quality report.
Generate software bill of materials for all dependencies.
Move the setup from the local machine to Cloud (AWS).
Store required secrets separately with a Secrets Management Service.
Identify assumptions made while creating the pipeline for DVNA by implementing a similar setup for another application (SuiteCRM).