You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+6-11Lines changed: 6 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -17,14 +17,11 @@
17
17
18
18
Harden-Runner provides network egress filtering and runtime security for GitHub-hosted and self-hosted runners.
19
19
20
-
For self-hosted environments, Harden-Runner supports:
20
+
Learn how Harden-Runner works through the video below, which shows how it detected a supply chain attack on a Google open-source project.
21
21
22
-
1. Kubernetes runners setup using Actions Runner Controller (ARC)
23
-
2. Virtual Machine runners (e.g. on EC2) - both ephemeral and persistent runners are supported
22
+
<ahref="https://youtu.be/Yz72qAOrN9s"target="_blank"><imgsrc="images/case-study-thumbnail1.png"alt="Harden-Runner detected supply chain attack in a Google open-source project"title="This case study video shows how StepSecurity Harden-Runner detected a CI/CD supply chain attack in real-time in Google’s open-source project Flank"></a>
24
23
25
-

26
-
27
-
## Explore open source projects using Harden-Runner
| 1. | Monitor and block outbound network traffic at the DNS, HTTPS (Layer 7), and network layers (Layers 3 and 4) to prevent exfiltration of code and CI/CD credentials | To prevent the [Codecov breach](https://github.com/step-security/github-actions-goat/blob/main/docs/Vulnerabilities/ExfiltratingCICDSecrets.md) scenario |
44
-
| 2. | Detect if source code is being tampered during the build process to inject a backdoor | To detect the [SolarWinds incident](https://github.com/step-security/github-actions-goat/blob/main/docs/Vulnerabilities/TamperingDuringBuild.md) scenario |
41
+
| 2. | Detect if source code is being tampered during the build process to inject a backdoor | To detect the [XZ Utils](https://www.stepsecurity.io/blog/analysis-of-backdoored-xz-utils-build-process-with-harden-runner) and [SolarWinds incident](https://github.com/step-security/github-actions-goat/blob/main/docs/Vulnerabilities/TamperingDuringBuild.md) scenario |
45
42
| 3. | Detect poisoned workflows and compromised dependencies | To detect [Dependency confusion](https://github.com/step-security/github-actions-goat/blob/main/docs/Vulnerabilities/ExfiltratingCICDSecrets.md#dependency-confusion-attacks) and [Malicious dependencies](https://github.com/step-security/github-actions-goat/blob/main/docs/Vulnerabilities/ExfiltratingCICDSecrets.md#compromised-dependencies)|
46
43
47
-
Read this [case study](https://infosecwriteups.com/detecting-malware-packages-in-github-actions-7b93a9985635) on how Harden-Runner detected malicious packages in the NPM registry.
48
-
49
44
## How
50
45
51
46
### GitHub-Hosted Runners
@@ -68,13 +63,13 @@ Read this [case study](https://infosecwriteups.com/detecting-malware-packages-in
68
63
3. Click on the link ([example link](https://app.stepsecurity.io/github/step-security/github-actions-goat/actions/runs/7704454287)). You will see a process monitor view of network and file events correlated with each step of the job.
69
64
70
65
<p align="left">
71
-
<img src="images/network-events.png" alt="Insights from harden-runner" >
66
+
<img src="images/network-events1.png" alt="Insights from harden-runner" >
72
67
</p>
73
68
74
69
4. In the `Recommended Policy` tab, you'll find a recommended block policy based on outbound calls aggregated from the current and past runs of the job. You can update your workflow file with this policy, or alternatively, use the [Policy Store](https://docs.stepsecurity.io/harden-runner/how-tos/block-egress-traffic#2-add-the-policy-using-the-policy-store) to apply the policy without modifying the workflow file. From now on, any outbound calls not in the allowed list will be blocked.
75
70
76
71
<p align="left">
77
-
<img src="images/recommended-policy.png" alt="Policy recommended by harden-runner" >
72
+
<img src="images/recommended-policy1.png" alt="Policy recommended by harden-runner" >
0 commit comments