Checkov 2.0 Launches as the First Open-Source Cloud Infrastructure Scanner With Dependency Awareness


“This release is the most significant update to Checkov since it launched in 2019,” said Matt Johnson, Bridgecrew developer advocate lead at Palo Alto Networks. “Dependency awareness means developers have even more context earlier in the development lifecycle, helping companies around the world better secure their cloud infrastructure.”

According to a recent survey produced by Secure Code Warrior, 70% of organizations recognize the importance of secure coding practices, indicating an industry-wide shift from reaction to prevention and an embrace of DevSecOps. Unlike other static code analysis tools that rely on interim ad hoc modeling, Checkov is now built on a graph-based model that provides an entirely new way of modeling configuration risk in cloud native software composition. That context awareness ensures more relevant and reliable scan results, making it easier for developers to prioritize and understand the impact of identified misconfigurations.

“Policies that take into account interdependencies within IaC are critical to understanding the impact of misconfigurations,” said Rob Eden, a Checkov contributor. “It’s not enough to know that a security group has ports open to the world; we need to know if that misconfiguration is in production or just a test environment in order to prioritize it appropriately. It’s awesome to have an open-source tool providing that level of context.”


  • Over 200 new policies making it the most robust open-source IaC scanner.
  • Built using NetworkX, the popular Python package for analysis of complex networks.
  • Dockerfile misconfiguration scanning secures container build tasks in continuous integration (CI) workflows.
  • Graph-based mapping enables scanning of complex inventory and configuration errors that require parsing and storing data with their full contextualized relationships intact.

Checkov 2.0 includes over 200 new policies and a Dockerfile scanner that help ensure container images are built securely, without misconfigurations. According to Unit 42’s most recent Cloud Threat Report, 51% of Docker containers use insecure defaults. Checkov 2.0 identifies these concerns directly within the developer’s integrated development environment (IDE) via the recently released VS Code extension, making it easy to quickly patch and build more secure applications in Kubernetes and other containerized environments.

For further details, see Palo Alto Networks’ blog post: Announcing Checkov 2.0: Deepening Open Source IaC Security.

Image licensed by

Related News:

Palo Alto Networks Achieves New FedRAMP Authorization including Prisma Cloud, Cortex XDR and Cortex Data Lake

Skybox Security Delivers Industry’s Most Advanced Exposure Analysis




About Author