wheels deploy audit
Audit deployment configuration and security settings to ensure compliance and best practices.
Synopsis
Description
The wheels deploy audit
command performs a comprehensive security and configuration audit of your deployment setup. It checks for common misconfigurations, security vulnerabilities, and compliance issues in your deployment environment.
Options
--environment, -e
- Target environment to audit (default: production)--report-format
- Output format for audit report (json, html, text) (default: text)--output, -o
- Save audit report to file--severity
- Minimum severity level to report (low, medium, high, critical)--fix
- Attempt to automatically fix issues where possible--verbose, -v
- Show detailed audit information
Examples
Basic audit
Audit staging environment
Generate HTML report
Show only high severity issues
Auto-fix issues
Audit Checks
The command performs the following audit checks:
Security
SSL/TLS configuration
Exposed sensitive files
Default credentials
Authentication mechanisms
Authorization settings
Input validation
Session management
Error handling
Configuration
Environment variables
Database connections
API endpoints
File permissions
Resource limits
Logging configuration
Backup settings
Monitoring setup
Compliance
Data protection requirements
Access control policies
Audit trail completeness
Retention policies
Encryption standards
Output
The audit generates a detailed report including:
Summary of findings
Issue severity levels
Affected components
Remediation recommendations
Compliance status
Performance metrics
Use Cases
Pre-deployment audit
Scheduled audits
Compliance reporting
Best Practices
Regular audits: Run audits regularly, not just before deployments
Fix critical issues: Always address critical and high severity issues
Document exceptions: Keep records of accepted risks and exceptions
Automate checks: Integrate audits into your CI/CD pipeline
Review reports: Have security team review audit reports
Integration
The audit command integrates with:
CI/CD pipelines for automated security checks
Monitoring systems for continuous compliance
Issue tracking systems for remediation workflow
Reporting tools for compliance documentation
See Also
Last updated
Was this helpful?