KICS is an open-source static analysis tool that finds security vulnerabilities, compliance issues, and misconfigurations in Infrastructure as Code.
KICS is an open-source static analysis tool that scans Infrastructure as Code files for security vulnerabilities, compliance issues, and infrastructure misconfigurations. It helps developers identify and fix problems early in the development cycle, preventing insecure configurations from reaching production environments.
DevOps engineers, cloud architects, and security teams who manage infrastructure using Terraform, Kubernetes, CloudFormation, or other IaC frameworks and need to enforce security and compliance standards.
Developers choose KICS because it supports a wide range of IaC platforms, integrates easily into CI/CD pipelines, and is fully extensible with customizable queries, all while being open-source and free to use.
Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
KICS supports over 15 IaC frameworks including Terraform, Kubernetes, CloudFormation, and more, as detailed in the README's comprehensive logo tables and platform list.
The tool uses editable heuristics rules (queries) that can be extended or added, allowing teams to tailor security checks to specific compliance needs, emphasized in the extensibility philosophy.
Designed for automated pipeline scanning, KICS is integrated into GitLab and other CI/CD systems, helping prevent insecure deployments early, as shown in the documentation and user list.
Freely available with Docker support, KICS can be run on your own infrastructure without vendor lock-in, making it cost-effective for cloud-native projects.
Keeping queries up-to-date with evolving security threats requires ongoing effort, and reliance on community contributions may slow updates for niche use cases.
Static analysis can flag benign configurations, necessitating manual review and query tuning to avoid noise in CI/CD pipelines, which isn't automated out-of-the-box.
KICS lacks a graphical user interface, which might hinder teams accustomed to visual dashboards for reporting and managing security findings.