Configure your integration to find security issues in your CloudFormation files (current IaC)
Last updated
Last updated
More information
Snyk privacy policy© 2024 Snyk Limited | All product and company names and logos are trademarks of their respective owners.
This page applies to current IaC only.
Snyk tests and monitors CloudFormation files from source code repositories. It gives advice on how to better secure cloud environments by catching misconfigurations before they are pushed to production, along with assistance on how best to fix them.
Snyk scans CloudFormation files in JSON
and YAML
format when imported from an integrated Git repository. Scan a CloudFormation module repository by either importing the repo that holds the module from an SCM or by specifying the directory itself with the snyk iac test
CLI command.
Scanning CloudFormation provides security feedback on everything that is statically configured in the module. To benefit from recurring and scheduled testing, follow the best practice of importing custom modules directly from an SCM.
You must be an administrator for the Organization you are configuring in Snyk.
Ensure you have already integrated your Git repository, For details, see Git repository (SCM) integrations.
Log in to your account and navigate to the relevant Group and Organization that you want to manage. Integrations are managed per Organization.
Toggle the setting to enable Snyk to detect Infrastructure as code files as shown:
If needed, review and adjust the Infrastructure as code Severity settings on the AWS tab in the example. Check to select the file types to scan, CloudFormation, Terraform, or both, and from the pulldown selection, choose the severity level for each API Gateway.