欢迎使用 FlowZap,快速、清晰、掌控的绘图应用。

安全扫描工作流

devops

在 CI/CD 流水线中包含 SAST、DAST、依赖漏洞扫描、问题分级处理及修复跟踪的安全扫描工作流。

完整 FlowZap 代码

CI { # CI Pipeline
n1: circle label:"Start"
n2: rectangle label:"Checkout code"
n3: rectangle label:"Install dependencies"
n4: rectangle label:"Trigger security scans"
n5: rectangle label:"Review scan results"
n6: circle label:"End"
n1.handle(right) -> n2.handle(left)
n2.handle(right) -> n3.handle(left)
n3.handle(right) -> n4.handle(left)
n4.handle(bottom) -> SAST.n7.handle(top) [label="Static analysis"]
n4.handle(bottom) -> SCA.n12.handle(top) [label="Dependency scan"]
n5.handle(right) -> n6.handle(left)
}
SAST { # Static Analysis
n7: rectangle label:"Run Semgrep rules"
n8: rectangle label:"Scan for secrets"
n9: diamond label:"Critical findings?"
n10: rectangle label:"Generate SARIF report"
n11: rectangle label:"Block pipeline"
n7.handle(right) -> n8.handle(left)
n8.handle(right) -> n9.handle(left)
n9.handle(right) -> n10.handle(left) [label="No"]
n9.handle(bottom) -> n11.handle(top) [label="Yes"]
n10.handle(bottom) -> SecurityDashboard.n17.handle(top) [label="Upload"]
n11.handle(top) -> CI.n5.handle(bottom) [label="Failed"]
}
SCA { # Software Composition Analysis
n12: rectangle label:"Parse dependency manifest"
n13: rectangle label:"Check CVE databases"
n14: diamond label:"High severity CVEs?"
n15: rectangle label:"Generate SBOM"
n16: rectangle label:"Flag vulnerable packages"
n12.handle(right) -> n13.handle(left)
n13.handle(right) -> n14.handle(left)
n14.handle(right) -> n15.handle(left) [label="No"]
n14.handle(bottom) -> n16.handle(top) [label="Yes"]
n15.handle(bottom) -> SecurityDashboard.n17.handle(top) [label="Upload"]
n16.handle(bottom) -> SecurityDashboard.n17.handle(top) [label="Report"]
}
SecurityDashboard { # Security Dashboard
n17: rectangle label:"Aggregate scan results"
n18: rectangle label:"Calculate risk score"
n19: diamond label:"Meets security policy?"
n20: rectangle label:"Approve for deployment"
n21: rectangle label:"Create remediation tickets"
n17.handle(right) -> n18.handle(left)
n18.handle(right) -> n19.handle(left)
n19.handle(right) -> n20.handle(left) [label="Yes"]
n19.handle(bottom) -> n21.handle(top) [label="No"]
n20.handle(top) -> CI.n5.handle(bottom) [label="Passed"]
n21.handle(top) -> CI.n5.handle(bottom) [label="Action required"]
}

Quick Answer

安全扫描工作流 is a workflow template that security vulnerabilities in code and dependencies are the #1 cause of data breaches.

为什么需要这个工作流?

Security vulnerabilities in code and dependencies are the #1 cause of data breaches. Shifting security left into the CI/CD pipeline catches issues before they reach production. This workflow integrates SAST, DAST, and dependency scanning with automated triage and remediation tracking.

工作原理

  1. Step 1: SAST (Static Application Security Testing) scans source code for vulnerabilities like SQL injection and XSS.
  2. Step 2: Dependency scanning checks for known CVEs in npm, pip, or Maven packages.
  3. Step 3: DAST (Dynamic Application Security Testing) runs against the staging environment to find runtime vulnerabilities.
  4. Step 4: Findings are deduplicated and triaged by severity (Critical, High, Medium, Low).
  5. Step 5: Critical and High findings block the deployment pipeline until remediated.
  6. Step 6: Remediation tasks are created in Jira with SLA deadlines based on severity.

替代方案

Manual security reviews are slow and inconsistent. Enterprise tools like Snyk, Checkmarx, or Veracode cost $10K-100K/year. This workflow helps teams visualize their DevSecOps pipeline and identify gaps before investing in tooling.

Key Facts

Template Name安全扫描工作流
Categorydevops
Steps6 workflow steps
FormatFlowZap Code (.fz file)

相关模板

备份恢复工作流程

devops

备份和恢复工作流程,包含**定时备份**、**异地复制**、**保留策略执行**、**恢复测试**和**RTO/RPO 验证**。

证书续期工作流

devops

SSL/TLS证书续期工作流,包含到期监控、按类型(DV/OV/EV)证书请求、域名验证、部署到负载均衡器以及健康检查验证与回滚。

CI/CD管道工作流

devops

完整的CI/CD管道,包含代码检出、代码检查、单元测试、构件构建、暂存部署、烟雾测试、生产部署以及失败时的自动回滚。

数据库迁移工作流程

devops

数据库架构迁移工作流程,包括 CI 测试、DBA 审核与批准、维护时间窗口安排、备份快照、迁移执行、数据完整性验证以及自动回滚。

返回所有模板