wheels deploy audit
Audit deployment configuration and security settings to ensure compliance and best practices.
Synopsis
wheels deploy audit [options]
Description
The wheels deploy audit
command performs a comprehensive security and configuration audit of your deployment setup. It checks for common misconfigurations, security vulnerabilities, and compliance issues in your deployment environment.
Options
--environment, -e
- Target environment to audit (default: production)--report-format
- Output format for audit report (json, html, text) (default: text)--output, -o
- Save audit report to file--severity
- Minimum severity level to report (low, medium, high, critical)--fix
- Attempt to automatically fix issues where possible--verbose, -v
- Show detailed audit information
Examples
Basic audit
wheels deploy audit
Audit staging environment
wheels deploy audit --environment staging
Generate HTML report
wheels deploy audit --report-format html --output audit-report.html
Show only high severity issues
wheels deploy audit --severity high
Auto-fix issues
wheels deploy audit --fix
Audit Checks
The command performs the following audit checks:
Security
SSL/TLS configuration
Exposed sensitive files
Default credentials
Authentication mechanisms
Authorization settings
Input validation
Session management
Error handling
Configuration
Environment variables
Database connections
API endpoints
File permissions
Resource limits
Logging configuration
Backup settings
Monitoring setup
Compliance
Data protection requirements
Access control policies
Audit trail completeness
Retention policies
Encryption standards
Output
The audit generates a detailed report including:
Summary of findings
Issue severity levels
Affected components
Remediation recommendations
Compliance status
Performance metrics
Use Cases
Pre-deployment audit
# Run comprehensive audit before deploying
wheels deploy audit --severity low
wheels deploy push --if-audit-passes
Scheduled audits
# Run regular audits in CI/CD
wheels deploy audit --output reports/audit-$(date +%Y%m%d).json
Compliance reporting
# Generate compliance report
wheels deploy audit --report-format html --output compliance.html
Best Practices
Regular audits: Run audits regularly, not just before deployments
Fix critical issues: Always address critical and high severity issues
Document exceptions: Keep records of accepted risks and exceptions
Automate checks: Integrate audits into your CI/CD pipeline
Review reports: Have security team review audit reports
Integration
The audit command integrates with:
CI/CD pipelines for automated security checks
Monitoring systems for continuous compliance
Issue tracking systems for remediation workflow
Reporting tools for compliance documentation
See Also
deploy status - Check deployment status
security scan - Run security scans
deploy setup - Setup deployment environment
Last updated
Was this helpful?