Skip to main content

NIST RMF Cloud Security Hardening — Pre-Commit & Pre-Merge Compliance Gate

Project description

🛡️ ControlGate

CI Python 3.10+ License: MIT

NIST RMF Cloud Security Hardening — Pre-Commit & Pre-Merge Compliance Gate

ControlGate is an AI-powered agent skill that scans your code changes against the NIST SP 800-53 Rev. 5 security framework before every commit and merge. It maps findings directly to specific NIST control IDs, providing traceable compliance evidence and actionable remediation guidance.

Quick Start

# Install
pip install controlgate

# Scan staged changes
controlgate scan --mode pre-commit --format markdown

# Scan PR diff against main
controlgate scan --mode pr --target-branch main --format json markdown

How It Works

Developer writes code
       ↓
git commit / Pull Request
       ↓
ControlGate intercepts the diff
       ↓
8 Security Gates scan against 370 non-negotiable NIST controls
       ↓
Verdict: BLOCK 🚫 / WARN ⚠️ / PASS ✅

The Eight Security Gates

# Gate NIST Families What It Catches
1 🔑 Secrets IA-5, SC-12, SC-28 Hardcoded creds, API keys, private keys
2 🔒 Crypto SC-8, SC-13, SC-17 Weak algorithms, missing TLS, ssl_verify=False
3 🛡️ IAM AC-3, AC-5, AC-6 Wildcard IAM, missing auth, overprivileged roles
4 📦 Supply Chain SR-3, SR-11, SA-10 Unpinned deps, missing lockfiles, build tampering
5 🏗️ IaC CM-2, CM-6, SC-7 Public buckets, 0.0.0.0/0 rules, root containers
6 ✅ Input SI-10, SI-11 SQL injection, eval(), exposed stack traces
7 📋 Audit AU-2, AU-3, AU-12 Missing security logging, PII in logs
8 🔄 Change CM-3, CM-4, CM-5 Unauthorized config changes, missing CODEOWNERS

Installation

From Source

git clone https://github.com/YOUR_ORG/controlgate.git
cd controlgate
python3 -m venv .venv && source .venv/bin/activate
make install-dev

As a Pre-Commit Hook

# .pre-commit-config.yaml
repos:
  - repo: local
    hooks:
      - id: controlgate
        name: ControlGate Security Scan
        entry: python -m controlgate scan --mode pre-commit --format markdown
        language: python
        always_run: true

As a GitHub Action

Copy hooks/github_action.yml to .github/workflows/controlgate.yml in your repo.

Configuration

Create a .controlgate.yml in your project root:

baseline: moderate              # low | moderate | high
catalog: baseline/nist80053r5_full_catalog_enriched.json

gates:
  secrets:    { enabled: true,  action: block }
  crypto:     { enabled: true,  action: block }
  iam:        { enabled: true,  action: warn  }
  sbom:       { enabled: true,  action: warn  }
  iac:        { enabled: true,  action: block }
  input:      { enabled: true,  action: block }
  audit:      { enabled: true,  action: warn  }
  change:     { enabled: true,  action: warn  }

thresholds:
  block_on:   [CRITICAL, HIGH]
  warn_on:    [MEDIUM]
  ignore:     [LOW]

exclusions:
  paths: ["tests/**", "docs/**", "*.md"]

CLI Usage

# Scan staged changes (pre-commit mode)
controlgate scan --mode pre-commit --format markdown

# Scan PR diff
controlgate scan --mode pr --target-branch main --format json markdown sarif

# Scan a saved diff file
controlgate scan --diff-file path/to/diff --format json

# Output reports to directory
controlgate scan --output-dir .controlgate/reports --format json markdown sarif

Output Formats

Format Use Case
markdown PR comments, terminal output
json Programmatic consumption, dashboards
sarif GitHub Code Scanning integration

Development

make install-dev    # Install with dev dependencies
make test           # Run tests
make test-cov       # Run tests with coverage
make lint           # Lint with ruff
make format         # Auto-format code
make typecheck      # Type check with mypy
make check          # Run all checks (lint + typecheck + test)
make build          # Build distribution packages

Data Source

Powered by the NIST Cloud Security Baseline (NCSB) enriched catalog:

  • 1,189 controls across 20 families
  • 370 non-negotiable at Moderate baseline
  • 247 code-relevant controls mapped to automated scanning rules

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

controlgate-0.1.2.tar.gz (327.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

controlgate-0.1.2-py3-none-any.whl (325.8 kB view details)

Uploaded Python 3

File details

Details for the file controlgate-0.1.2.tar.gz.

File metadata

  • Download URL: controlgate-0.1.2.tar.gz
  • Upload date:
  • Size: 327.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.19

File hashes

Hashes for controlgate-0.1.2.tar.gz
Algorithm Hash digest
SHA256 eceb10607536d0a7c1e406a53df3becc68d362765c003f8f55e04d87022c3dff
MD5 d8c4afdf699ce920ccafe36db315a67d
BLAKE2b-256 08758ea407ea5dd69893c36dafcf9e0a8754a912c08c1f5732b5ce82322d0062

See more details on using hashes here.

File details

Details for the file controlgate-0.1.2-py3-none-any.whl.

File metadata

  • Download URL: controlgate-0.1.2-py3-none-any.whl
  • Upload date:
  • Size: 325.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.19

File hashes

Hashes for controlgate-0.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 32c95e7519c6edb0c6d87e88b2ba3a0dfb6838ad0435e7b1a6b4ed129ed2941c
MD5 b9bd61a5e5eaa4b2233da3a4fba1f74e
BLAKE2b-256 1bbcc23a075e508433abf8bac29f9ebb9a99bb7b33832cd3662c72db97ceaa43

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page