Welcome to DefendStack Suite. Our security suite enhances your organization's security posture with a unified appsec platform featuring: Runtime Secret Scanning and Software Composition Analysis (SCA) via webhooks, comprehensive Asset Inventory, streamlined Incident Management, dynamic Scoring & Risk-Based Prioritization, RBAC, SSO, Rich API, and Slack/Jira Integrations.
Try out DefendStack Suite with our live demo!
🖥 URL: https://app.defendstack.org
🔑 Login Credentials:
- Username:
demo
- Password:
Zf8u8OMM(0j
⚠ Security Notice:
- This demo is for evaluation purposes only.
- Do not perform brute force attacks, DoS, or any malicious activity.
- Misuse of the demo environment may result in access restrictions.
You have two installation options: Docker and AWS CloudFormation.
-
Clone the Repository
First, clone this repository to your local machine:git clone https://github.com/Defendstack/defendstack-suite.git cd defendstack-suite/docker-compose
-
Set up Docker Compose
In this repo, you’ll find adocker-compose.yml
file to help you set up both tools with minimal configuration.Make sure you have Docker and Docker Compose installed. If not, you can get them here.
-
Run Docker Compose
Start the services by running:docker-compose up -d
-
Access the Tools
Once the containers are up and running, you can access the services on the following ports (check thedocker-compose.yml
for specific mappings):- DefendStack Platform:
http://localhost:3000
- DefendStack Platform:
-
Stopping the Services
To stop the services, simply run:docker-compose down
-
Access the CloudFormation Template
Open the AWS CloudFormation console and click on Create stack.
Use the following template URL:https://github.com/Defendstack/DefendStack-Suite/blob/main/aws-cloudformation/template-1-0.yaml
-
Launch the CloudFormation Stack
- Choose "Template is ready" and select "Amazon S3 URL".
- Paste the URL above and click Next.
- Provide a Stack Name and any required parameters.
- Click Next, configure stack options if needed, and proceed.
- Acknowledge any IAM permissions required and click Create Stack.
- Wait for Deployment
- The deployment process will take a few minutes.
- Monitor the progress in the CloudFormation Stacks section.
- Once complete, the status will change to
CREATE_COMPLETE
.
- Access the Tools
- After the stack is deployed, go to the Outputs tab.
- Find the endpoint URLs for accessing the deployed services.
- Deleting the Stack
If you want to remove the deployment, delete the stack by selecting it in CloudFormation and clicking Delete.
Review and customize the default configuration in values.yaml
based on your environment:
cat values.yaml
Key things to check:
- Image repositories and tags
- Resource limits (CPU, memory)
- Enabled/disabled components
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.1/deploy/static/provider/cloud/deploy.yaml
helm upgrade --install defendstack helm-chart/ --namespace defendstack --create-namespace --dependency-update
defendstack
: release namehelm-chart/
: path to the chart--namespace defendstack
: Helm will install resources into this namespace (and create it if it doesn't exist)
If you want to override any default config, use a custom my-values.yaml
file:
helm upgrade --install defendstack helm-chart/ -f my-values.yaml --namespace defendstack --create-namespace --dependency-update
kubectl get pods -n defendstack
kubectl get svc -n defendstack
You should see all components like postgres
, frontend
, backend-auth
, backend-main
, etc., running.
Wait for ingress resource, it will automatically get the <external-ip>
kubectl get ingress -n defendstack
Copy the <external-ip>
and run the below commands
kubectl set env deployment/defendstack-thedefendstack-app-frontend VITE_API_BASE_URL="https://<external-ip>/api" -n defendstack
kubectl rollout restart deployment defendstack-thedefendstack-app-frontend -n defendstack
Use the same external Ip from the above step
https://<external-ip> (from step 6)
To upgrade:
helm upgrade --install defendstack helm-chart/ --namespace defendstack --create-namespace --dependency-update
To uninstall:
helm uninstall defendstack --namespace defendstack
After installation, you can begin using the tools:
- Secrets Scanning Tool: This tool scans your codebase for sensitive information like passwords, API keys, and other secrets.
- SCA Tool: The Software Composition Analysis tool analyzes your project’s dependencies for vulnerabilities, ensuring you know the security risks of your third-party libraries.
For detailed usage instructions for each tool, refer to the respective documentation over here.
At DefendStack, we take the security of our systems seriously. We value the input of security researchers and the broader community in helping to maintain high security standards. This policy sets out our commitments and guidelines for responsible vulnerability disclosure. Read our full Policy for detailed information about vulnerability disclosure program.
We're here to help you succeed with The DefendStack platform!
📚 Documentation: https://docs.defendstack.org
💬 Community: [Discord Community Link]
📧 Email: [email protected]
📞 Call: Lavlesh(+91-8057599291)
Questions? Choose any channel - we're responsive on all of them!