department-of-veterans-affairs/ascent-fortify-ami

Name: ascent-fortify-ami

Owner: Department of Veterans Affairs

Description: null

Created: 2017-08-09 13:23:50.0

Updated: 2018-05-24 15:02:54.0

Pushed: 2018-05-24 15:02:57.0

Homepage: null

Size: 81

Language: HCL

GitHub Committers

UserMost Recent Commit# Commits

Other Committers

UserEmailMost Recent Commit# Commits

README

Fortify Logo

Fortify AWS Module

This repo contains a Module for how to deploy Fortify utility servers on AWS using Terraform. Fortify is s licensed distribution that performs security scans on your code. By default, Fortify SSC uses a MySQL database as the storage backend for scans, suppressions, etc.

This Module includes:

What's a Module?

Modules in Terraform are self-contained packages of Terraform configurations that are managed as a group. Modules are used to create reusable components in Terraform as well as for basic code organization. A root module is the current working directory when you run terraform apply or get, holding the Terraform configuration files. It is itself a valid module. The root modules in this project are fortify-server and jenkins-fortify-slave. See [https://www.terraform.io/docs/modules/usage.html] for more details for creating your own module.

Prerequisites
How do you use this Module?

This Module has the following folder structure:

To Deploy Fortify SSC 17.20
  1. Create an AMI that has Fortify SSC installed (using the packer scripts)
  2. Deploy that AMI in a private subnet with a MySQL AWS RDS instance using the Terraform fortify-server module.
  3. Log into the SSC server.
  4. If you have the ascent dns servers deployed already, you can wait until the next day and log into the Fortify SSC server URL at http://fortify.internal.vets-api.gov:8080/ssc
  5. If you do not have the ascent dns servers deployed or don't have the patience to wait for the next day, then log into the Fortify SSC server through http://{fortify_private_ip}:8080/ssc
  6. The first time username/password credentials are admin/admin. You will be prompted to change them after logging in.
To Deploy Fortify Jenkins Slave
  1. Create an AMI that has Fortify SCA and Apps installed (using the packer scripts)
  2. Setup your Jenkins Master for the slave to connect to
  3. Deploy your AMI from Step 1 in a private subnet and register it to the Jenkins Master instance using the Terraform jenkins-fortify-slave module.

This work is supported by the National Institutes of Health's National Center for Advancing Translational Sciences, Grant Number U24TR002306. This work is solely the responsibility of the creators and does not necessarily represent the official views of the National Institutes of Health.