Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • The Hacker News
  • Securing CI/CD workflows with Wazuh
  • The Hacker News

Securing CI/CD workflows with Wazuh

[email protected] The Hacker News Published: May 21, 2025 | Updated: May 21, 2025 5 min read
0 views

Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released to different environments. CI/CD pipelines are fundamental in modern software development, ensuring code is consistently tested, built, and deployed quickly and efficiently.

While CI/CD automation accelerates software delivery, it can also introduce security risks. Without proper security measures, CI/CD workflows can be vulnerable to supply chain attacks, insecure dependencies, and insider threats. To mitigate these risks, organizations must integrate measures for continuous monitoring and enforcing security best practices at every pipeline stage. Securing CI/CD workflows preserves the software delivery process’s confidentiality, integrity, and availability.

Security challenges and risks in CI/CD workflows

While CI/CD workflows offer benefits in terms of automation and speed, they also bring unique security challenges that must be addressed to maintain the integrity of the development process. Some common challenges and risks include:

  1. Lack of visibility and inadequate security monitoring: CI/CD workflows involve multiple tools and stages, which make it challenging to maintain security visibility into potential threats. Vulnerabilities, especially in third-party libraries or containerized applications, can introduce security risks that go undetected if not correctly managed. Without centralized monitoring, real-time threat detection and response become difficult. Manual, reactive incident response increases the risk of exploitation.
  2. Compliance requirements: Meeting regulatory standards such as GDPR or HIPAA while maintaining fast deployment cycles can be challenging. Organizations must balance enforcing security policies, data protection, and compliance requirements without slowing down their CI/CD workflows.
  3. Code and dependency vulnerabilities: Unpatched or outdated dependencies in the workflow can introduce significant security risks. Third-party libraries or outdated packages can become attack vectors if not regularly updated and monitored for vulnerabilities. These risks are increased by the fast pace of CI/CD, where vulnerabilities may go untreated.
  4. Container vulnerabilities and image security: While containers are mainly used in CI/CD workflows, they are not safe from security risks. Vulnerabilities in container images, such as outdated software versions, misconfigurations, or insecure base images, present a risk in CI/CD workflows and can be exploited by attackers. Without proper scanning and validation, these weaknesses can propagate through the pipeline.
  5. Misconfiguration of CI/CD tools: Improper configuration of CI/CD tools can leave the workflow open to unauthorized access or unintentionally expose sensitive code. Misconfigurations in access control settings can increase the likelihood of privilege escalation or code exposure. Additionally, hardcoded credentials or mismanaged environment variables introduce a risk of being extracted by attackers, which could lead to data breaches.
  6. Supply chain attacks: Compromised third-party dependencies can introduce malicious packages or vulnerabilities into the workflow. These vulnerabilities can spread throughout the entire pipeline and infect production environments, primarily when third-party tools or libraries are not sufficiently validated.
  7. Insider threats: Insider threats in CI/CD workflows involve authorized users such as developers, DevOps engineers, system administrators, or third-party contractors, who may intentionally or unintentionally compromise the pipeline. Weak authentication mechanisms, inadequate access controls, and a lack of monitoring can increase the risk of unauthorized changes, credential theft, or the introduction of malicious code into the workflow.

Enhancing CI/CD workflow security with Wazuh

Wazuh is an open source security platform that offers unified XDR and SIEM capabilities for on-premises, containerized, virtualized, and cloud-based environments. Wazuh provides flexibility in threat detection, compliance, incident handling, and third-party integration. Organizations can implement Wazuh to address the challenges and mitigate the risks associated with CI/CD workflow security. Below are some ways Wazuh helps improve security in CI/CD workflows.

Log collection and system monitoring

Wazuh provides log collection and analysis capabilities to ensure the components of your CI/CD environment are continuously monitored for security threats. It collects and analyzes logs from various CI/CD pipeline components, including servers, containerization and orchestration tools such as Docker and Kubernetes, and version control systems like GitHub. This allows security teams to monitor for unusual activities, unauthorized access, or security breaches across the CI/CD environment.

Additionally, the Wazuh File Integrity Monitoring (FIM) capability can detect unauthorized changes in code or configuration files. By monitoring files in real time or on a schedule, Wazuh generates alerts for security teams about file activities like creation, deletion, or modification.

Figure 1: Wazuh dashboard showing File Integrity Monitoring (FIM) alerts.

Custom rules and streamlined security monitoring

Wazuh allows users to create custom rules and alerts that align with a pipeline’s security requirements. Organizations can create custom rules matching their specific security needs, such as monitoring code changes, server configurations, or container images. This flexibility allows organizations to enforce granular security controls tailored to their CI/CD workflow.

For instance, the Center for Internet Security (CIS) Docker Benchmark provides guidelines for securing Docker environments. Organizations can automate the compliance checks against CIS Docker Benchmark v1.7.0 using the Wazuh Security Configuration Assessment (SCA) capability.

Figure 2: Wazuh dashboard showing Wazuh Security configuration assessment (SCA) results.

Integration with third-party security tools

Wazuh can integrate with various security tools and platforms, including container vulnerability scanners and CI/CD orchestration systems. This is particularly important in CI/CD workflows, where multiple tools may be used to manage the development lifecycle. Wazuh can pull in data from various sources, which helps to provide a centralized view of security across the pipeline.

For instance, Wazuh integrates with container vulnerability scanning tools Trivy and Grype, which are commonly used to scan container images for vulnerabilities, insecure base images, or outdated software versions. By scanning container images before they are deployed into production, organizations can ensure that only secure, up-to-date images are used in the deployment processes.

You can configure the Wazuh Command module to run a Trivy scan on an endpoint hosting container images and display any detected vulnerabilities in the Wazuh dashboard. This helps to ensure that insecure images are identified and prevented from being pushed into production.

Figure 3: Wazuh dashboard displaying vulnerabilities discovered on container images from a Trivy scan.

Automated incident response

The speed of CI/CD workflows means that threats must be detected and mitigated quickly to minimize the risk of breaches or downtime. Wazuh provides incident response capabilities that help organizations respond to security incidents as soon as they occur.

The Wazuh Active Response module can automatically take action when a security threat is detected. For example, suppose a malicious IP address is detected trying to access a system that runs CI/CD processes. In that case, Wazuh can automatically block the IP address and trigger predefined remediation actions. This automation ensures fast response, reduces manual intervention, and prevents potential threats from escalating.

Conclusion

Securing CI/CD workflows is important for maintaining a reliable and safe software development process. By using Wazuh, organizations can detect vulnerabilities early, monitor for anomalies, enforce compliance, and automate security responses while maintaining the speed and efficiency of CI/CD workflows. Integrating Wazuh into your CI/CD workflow ensures that security keeps pace with development speed.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter ï‚™ and LinkedIn to read more exclusive content we post.

About The Author

[email protected] The Hacker News

See author's posts

Original post here

What do you feel about this?

  • The Hacker News

Post navigation

Previous: How to Detect Phishing Attacks Faster: Tycoon2FA Example
Next: Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims

Author's Other Posts

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Related Stories

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
nist-cve.jpg
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

[email protected] The Hacker News April 17, 2026 0 1
europol.jpg
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

[email protected] The Hacker News April 17, 2026 0 0

Trending Now

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions nist-cve.jpg 5
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

April 17, 2026 0 1
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts europol.jpg 6
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

April 17, 2026 0 0
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation apachemq.jpg 7
  • The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

April 17, 2026 0 0

You may have missed

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
Copyright © 2026 All rights reserved. | MoreNews by AF themes.