N/A
Source
Chain Bench
ID
2.3
Version
cis-1.0

2.3 Build Instructions

2.3.1 Ensure all build steps are defined as code

Convert pipeline instructions into code-based syntax, and upload them to the organization’s version control platform.

2.3.5 Ensure access to the build process’s triggering is minimized

For every pipeline in use, grant only the necessary members permission to trigger it.

2.3.7 Ensure pipelines are automatically scanned for vulnerabilities

For each pipeline, set automated vulnerabilities scanning.

2.3.8 Ensure scanners are in place to identify and prevent sensitive data in pipeline files

For every pipeline that is in use, set scanners that will identify and prevent sensitive data in it.