Trusty is a free-to-use web app that provides data and scoring on the supply chain risk for open source packages.
It is not a secret that I very much like Open Policy Agent and its language called Rego. When it came to getting more complex policies working in Minder, I thought it would be a great use case to leverage a battle-hardened technology instead of writing our own language. This ended up being a great decision, as Minder can focus on the logic and context, and evaluation can be done in a flexible, expressive, and efficient manner.
Rego is a language specifically designed for expressing policies in a clear and concise manner. Its declarative syntax makes it an excellent choice for defining policy logic. In the context of Minder, Rego plays a central role in crafting Rule Types, which are used to enforce security policies.
(While we could spend some time explaining the syntax for rego, this blog post from Danny Baier at Styra does a better job at this.)
Minder organizes policies into Rule Types, each with specific sections defining how policies are ingested, evaluated, and acted upon. Rule types are then called within profiles to express the security posture of your organization. Let's delve into the essential components of a Minder Rule Type:
Ingesting Data: Fetching relevant data, often from external sources like GitHub API.
Evaluation: Applying policy logic to the ingested data. Minder offers a set of engines to evaluate data: jq
and rego
being general-purpose engines, while trusty
and vulncheck
are more use case-specific ones.
Remediation and Alerting: Taking actions or providing notifications based on evaluation results. E.g. creating a pull request or generating a GitHub security advisory.
If you’d like more information on writing rule types, we recently released a blog post about it!
With Rego being a flexible policy language, it allowed us to express policy checks via different constructs. We chose to implement two in Minder:
deny-by-default:
Checks for an allowed boolean being set to true, and denies the policy if it’s not the case.
constraints:
Checks for violations in the given policy. This allows us to express the violations and output them in a user friendly-manner.
Note that these are known patterns in the OPA community, so we’re not doing anything out of the ordinary here. Instead, we leverage best practices that have already been established.
Given the context in which Minder operates, we did need to add some custom functionality that OPA doesn’t provide out of the box. Namely, we added the following custom functions:
file.exists:
Verifies that the given file exists in the Git repository.
file.read:
Reads the contents of the given file in the Git repository.
file.ls:
Lists files in the given directory in the Git repository.
CodeQL is a very handy tool that GitHub provides to do static analysis on codebases. In this scenario, we’ll see a rule type that verifies that it’s enabled via a GitHub action in the repository.
---
version: v1
type: rule-type
name: codeql_enabled
context:
provider: github
description: Verifies that CodeQL is enabled for the repository
guidance: |
CodeQL is a tool that can be used to analyze code for security vulnerabilities.
It is recommended that repositories have some form of static analysis enabled
to ensure that vulnerabilities are not introduced into the codebase.
To enable CodeQL, add a GitHub workflow to the repository that runs the
CodeQL analysis.
For more information, see
https://docs.github.com/en/code-security/secure-coding/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#configuring-code-scanning-for-a-private-repository
def:
# Defines the section of the pipeline the rule will appear in.
# This will affect the template used to render multiple parts
# of the rule.
in_entity: repository
# Defines the schema for writing a rule with this rule being checked
rule_schema:
type: object
properties:
languages:
type: array
items:
type: string
description: |
Only applicable for remediation. Sets the CodeQL languages to use in the workflow.
CodeQL supports 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift'
schedule_interval:
type: string
description: |
Only applicable for remediation. Sets the schedule interval for the workflow.
required:
- languages
- schedule_interval
# Defines the configuration for ingesting data relevant for the rule
ingest:
type: git
git:
branch: main
# Defines the configuration for evaluating data ingested against the given profile
eval:
type: rego
rego:
type: deny-by-default
def: |
package minder
default allow := false
allow {
# List all workflows
workflows := file.ls("./.github/workflows")
# Read all workflows
some w
workflowstr := file.read(workflows[w])
workflow := yaml.unmarshal(workflowstr)
# Ensure a workflow contains the codel-ql action
some i
steps := workflow.jobs.analyze.steps[i]
startswith(steps.uses, "github/codeql-action/analyze@")
}
# Defines the configuration for alerting on the rule
alert:
type: security_advisory
security_advisory:
severity: "medium"
The rego evaluation uses the deny-by-default
type. It’ll set the policy as successful if there is a GitHub workflow that instantiates github/codeql-action/analyze
.
In this scenario, we’ll explore a Rule Type that verifies that a Dockerfile does not use the latest
tag.
---
version: v1
type: rule-type
name: dockerfile_no_latest_tag
context:
provider: github
description: Verifies that the Dockerfile image references don't use the latest tag
guidance: |
Using the latest tag for Docker images is not recommended as it can lead to unexpected behavior.
It is recommended to use a checksum instead, as that's immutable and will always point to the same image.
def:
# Defines the section of the pipeline the rule will appear in.
# This will affect the template used to render multiple parts
# of the rule.
in_entity: repository
# Defines the schema for writing a rule with this rule being checked
# In this case there are no settings that need to be configured
rule_schema: {}
# Defines the configuration for ingesting data relevant for the rule
ingest:
type: git
git:
branch: main
# Defines the configuration for evaluating data ingested against the given profile
# This example verifies that image in the Dockerfile do not use the 'latest' tag
# For example, this will fail:
# FROM golang:latest
# These will pass:
# FROM golang:1.21.4
# FROM golang@sha256:337543447173c2238c78d4851456760dcc57c1dfa8c3bcd94cbee8b0f7b32ad0
eval:
type: rego
rego:
type: constraints
def: |
package minder
violations[{"msg": msg}] {
# Read Dockerfile
dockerfile := file.read("Dockerfile")
# Find all lines that start with FROM and have the latest tag
from_lines := regex.find_n("(?m)^(FROM .*:latest|FROM --platform=[^ ]+ [^: ]+|FROM (?!scratch$)[^: ]+)( (as|AS) [^ ]+)?$", dockerfile, -1)
from_line := from_lines[_]
msg := sprintf("Dockerfile contains 'latest' tag in import: %s", [from_line])
}
# Defines the configuration for alerting on the rule
alert:
type: security_advisory
security_advisory:
severity: "medium"
This leverages the constraints Rego evaluation type, which will output a failure for each violation that it finds. This is handy for usability, as it will tell us exactly the lines that are not in conformance with our rules.
This is a more complex example. Here, we'll explore a Rule Type that checks for open security advisories in a GitHub repository.
---
version: v1
type: rule-type
name: no_open_security_advisories
context:
provider: github
description: |
Verifies that a repository has no open security advisories based on a given severity threshold.
The threshold will cause the rule to fail if there are any open advisories at or above the threshold.
It is set to `high` by default, but can be overridden by setting the `severity` parameter.
guidance: |
Ensuring that a repository has no open security advisories helps maintain a secure codebase.
This rule will fail if the repository has unacknowledged security advisories.
It will also fail if the repository has no security advisories enabled.
Security advisories that are closed or published are considered to be acknowledged.
For more information, see the [GitHub documentation](https://docs.github.com/en/code-security/security-advisories/working-with-repository-security-advisories/about-repository-security-advisories).
def:
in_entity: repository
rule_schema:
type: object
properties:
severity:
type: string
enum:
- unknown
- low
- medium
- high
- critical
default: high
required:
- severity
ingest:
type: rest
rest:
endpoint: "/repos/{{.Entity.Owner}}/{{.Entity.Name}}/security-advisories?per_page=100&sort=updated&order=asc"
parse: json
fallback:
# If we don't have advisories enabled, we'll get a 404
- http_code: 404
body: |
{"fallback": true}
eval:
type: rego
rego:
type: constraints
violation_format: json
def: |
package minder
import future.keywords.contains
import future.keywords.if
import future.keywords.in
severity_to_number := {
null: -1,
"unknown": -1,
"low": 0,
"medium": 1,
"high": 2,
"critical": 3,
}
default threshold := 1
threshold := severity_to_number[input.profile.severity] if input.profile.severity != null
above_threshold(severity, threshold) if {
severity_to_number[severity] >= threshold
}
had_fallback if {
input.ingested.fallback
}
violations contains {"msg": "Security advisories not enabled."} if {
had_fallback
}
violations contains {"msg": "Found open security advisories in or above threshold"} if {
not had_fallback
some adv in input.ingested
# Is not withdrawn
adv.withdrawn_at == null
adv.state != "closed"
adv.state != "published"
# We only care about advisories that are at or above the threshold
above_threshold(adv.severity, threshold)
}
alert:
type: security_advisory
security_advisory:
severity: "medium"
This verifies that a repository does not have untriaged security advisories within a given severity threshold. Thus ensuring that the team is actively taking care of the advisories and publishing or closing them depending on the applicability.
In order to enforce correctness and best practices for our rule types, we have a command-line utility called mindev that has a lint sub-command.
You can run it by doing the following from the Minder repository:
./bin/mindev ruletype lint -r path/to/rule
This will show you a list of suggestions to fix in your rule type definition.
The Styra team released a tool called Regal, which allows us to lint Rego policies for best practices or common issues. We embedded Regal into our own rule linting tool within mindev. So, running mindev ruletype lint
on a rule type that leverages Rego will also show you OPA-related best practices.
This introductory guide provides a foundation for leveraging Rego and Minder to write policies effectively. Experiment, explore, and tailor these techniques to meet the unique requirements of your projects.
Minder is constantly evolving, so don’t be surprised if we soon add more custom functions or even more evaluation engines! The project is in full steam and more features are coming!
You can see a list of rule types that we actively maintain here.
I’d also like to take this opportunity to send greetings to our friends at Styra, the folks who maintain Open Policy Agent, Rego, Regal, and a lot of very useful utilities that greatly benefit the community.