KICS Auto-Remediation
KICS introduces in 1.6.0 its engine for auto-remediation of IaC files. It has the ability to provide auto-remediation for single-line replacements and additions.
As of release 1.6.0, only Terraform files and vulnerabilities are supported. However, the extensibility of this feature will allow for covering more technologies and adding more complex remediation sorts really soon.
Learn more about it here.
Dynamic scanning of Kubernetes clusters
Now you can scan your deployed Kubernetes cluster by using KICS 1.6.0. KICS accesses your cluster API through provided authentication (either config file, service account token, or certificates) and is able to scan the cluster constituents like pods, services, and more, based on the selection of (a combination of) namespaces, apiVersion or Kinds.
Learn more about it here.
Breaking Changes in 1.6.0
KICS 1.6.0 is a major version and it is released with a few changes that can break integrations with external tools, pipelines or other. Below is a prime of such changes:
-
-
Exclude paths scanning with .gitignore file. KICS now reads .gitignore file in the root of the project to exclude from the scan the paths therein.
-
Consistency between scanning with and without the -t flag. -t or โtype flag is used to instruct KICS to scan only files of specific technologies. Before v1.6.0, KICS with -t flag would scan the project and, in case there were no files of the specified technologies, it would terminate with a message โNo files were scannedโ and no other output. From v1.6.0, KICS will keep its behavior consistent whether -t flag is used or not. It will always output a results file, even if it is an โemptyโ results report (created due to no files being scanned).
-
Masking Secrets. Now whenever Kics finds a secret in the IaC files, the results are shown as masked instead of plain text with the corresponding value.
See more details here.