15 Minutes
The Salient Static Application Security Testing (SAST) appliance monitors your Github codebase for any new code pushes or merges into a target branch. Once new code has been detected, the appliance runs it through a static application security test to check for any new code vulnerabilities.
If any new vulnerabilities were identified, those vulnerabilities are pushed to a custom Slack or Discord channel. Details of vulnerabilities include:
SAST scanning plays a crucial role in the Software Development Life Cycle (SDLC) by identifying vulnerabilities early in the development process, long before the software is deployed. By analyzing source code without executing the program, SAST allows developers to detect security flaws, such as coding errors and compliance issues, at a stage where they can be addressed with minimal cost and effort.
Additionally, integrating SAST into the SDLC helps organizations meet regulatory requirements, reduces the risk of costly data breaches, and ultimately builds trust with users by delivering more secure software. Salient's SAST appliance seamless integrates into the SDLC by running out-of-band and publishes its findings to Slack and Discord channels for quick, convenient security feedback.
For this tutorial we will deploy the Salient SAST appliance via the AWS marketplace. Next, we'll configure some policies to give the appliance the appropriate permissions to read private Github repositories and allow it to publish to Slack and Discord.
Here is an architectural diagram of what we’ll be setting up:
Either or both Slack and Discord usernames and webhooks can be specified. These usernames and webhooks will be used for notifications of new vulnerabilities identified.
Click here to see how to set up a Slack webhook and here to set up a Discord webhook - both are quick and easy.
2. The default encryption key is fine, click next. Set the secret name as "SAST" and enter an optional description.
Skip rotating the keys and store it.
3. Make note of the Secret ARN, you'll need it in the next step:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"secretsmanager:GetResourcePolicy",
"secretsmanager:GetSecretValue",
"secretsmanager:DescribeSecret",
"secretsmanager:ListSecretVersionIds"
],
"Resource": [
"arn:aws:secretsmanager:us-east-1:565805569036:secret:SAST-MtEiVy"
]
},
{
"Effect": "Allow",
"Action": "secretsmanager:ListSecrets",
"Resource": "*"
}
]
}
6. Now, click next and search for our ReadSecrets policy. Select it and again, click next.
7. Give the role a name like "SAST" and click "Create role".
Set the role to our newly created SAST role and click Modify IAM Role.
3. Reboot the SAST EC2 instance.
And that’s it! Your Salient SAST appliance is now monitoring your selected code repository branch for any new code pushed or merged into it. When a new vulnerability is identified, the appliance will send a notification to either or both Slack and Discord with the vulnerability details. Only new vulnerability notifications are sent, and they are only sent once to minimize alert fatigue:
No alerts populating in Slack or Discord?
Need to see the full SAST report?
scp -i ~/.ssh/replacewithyourkey.pem [email protected]://home/ec2-user/scans/semgrep.txt ./semgrep.txt
Have a question about our cloud solutions or need support with your current setup? We're here to help! Fill out the form below, and our team will get back to you as soon as possible to assist with your needs.