Paul Krill
Editor at Large

IBM adds code risk analyzer to cloud-based CI/CD

news
Nov 4, 20202 mins

IBM Cloud Continuous Delivery’s Code Risk Analyzer scans Python, Node.js, and Java source code in Git repositories for security and legal risks

Eyeglasses rest on a binary field / code review / threat assessment / check vulnerabilities
Credit: Suebsiri / Getty Images

Looking to bring security and compliance analytics to devops, IBM has added its Code Risk Analyzer capability to its IBM Cloud Continuous Delivery service.

Code Risk Analyzer is described by IBM as a security measure that can be configured to run at the start of a developer’s code pipeline, analyzing and reviewing Git repositories to discover issues with open source code. The goal is to help application teams recognize cybersecurity threats, prioritize application security problems, and resolve security issues. IBM Cloud Continuous Delivery helps provision toolchains, automate tests and builds, and control software quality with analytics.

IBM said that as cloud-native development practices such as microservices and containers change security and compliance processes, it is no longer feasible for centralized operations teams to manage application security and compliance. Developers need cloud-native capabilities such as Code Risk Analyzer to embed into existing workflows. Code Risk Analyzer helps developers ensure security and compliance in routine workflows.

In developing Code Risk Analyzer, IBM surveyed source artifacts used by IT organizations in building and deploying applications and in provisioning and configuring Kubernetes infrastructure and cloud services. Existing cloud solutions provide limited security controls across the source code spectrum including vulnerability scanning of application manifests. Thus it is necessary to design a solution that encompasses security and compliance assessment across artifacts.

Code Risk Analyzer scans Git-based source code repositories for Python, Node.js, and Java code and performs vulnerability checks, license management checks, and CIS (Center for Internet Security) compliance checks on deployment configurations and generating a “bill of materials” for all dependencies and their sources. Terraform files used to provision cloud services such as Cloud Object Store are scanned to find any security misconfigurations. 

IBM sought to anchor security controls in standards such as NIST or CIS and to flatten the learning curve while introducing users to new security practices. Developers are shielded from having to understand security definitions and policies, with actionable feedback provided.

Paul Krill

Paul Krill is editor at large at InfoWorld. Paul has been covering computer technology as a news and feature reporter for more than 35 years, including 30 years at InfoWorld. He has specialized in coverage of software development tools and technologies since the 1990s, and he continues to lead InfoWorld’s news coverage of software development platforms including Java and .NET and programming languages including JavaScript, TypeScript, PHP, Python, Ruby, Rust, and Go. Long trusted as a reporter who prioritizes accuracy, integrity, and the best interests of readers, Paul is sought out by technology companies and industry organizations who want to reach InfoWorld’s audience of software developers and other information technology professionals. Paul has won a “Best Technology News Coverage” award from IDG.

More from this author