Skip to content

CI/CD Pipeline Integration

Run CBOM compliance checks directly in your CI/CD pipeline. Prevent quantum-vulnerable cryptography, weak algorithms, or policy violations from reaching production by failing builds at the source.

hidden CI/CD pipeline diagram showing CBOM compliance gate between build and deploy stages


The CI/CD integration acts as a policy gate in your build pipeline:

  1. Export CBOM at build time — Scan your application’s cryptographic dependencies during the build
  2. Assess against policy via API — Submit the CBOM to the platform for policy evaluation
  3. Fail pipeline if violations found — Block deployment when crypto policy violations are detected

This enables shift-left crypto compliance — catching issues when developers introduce them, not weeks later during a security audit.


PlatformMethodStatus
GitHub ActionsCustom action (qcecuring/cbom-action)🔜 Coming Soon
GitLab CIDocker image + CI template🔜 Coming Soon
JenkinsPlugin + pipeline step🔜 Coming Soon
Azure DevOpsMarketplace extension🔜 Coming Soon

┌──────────┐ ┌──────────────┐ ┌──────────────┐ ┌──────────┐
│ Build │───▶│ CBOM Export │───▶│ Policy Check │───▶│ Deploy │
│ Stage │ │ (scan deps) │ │ (API call) │ │ Stage │
└──────────┘ └──────────────┘ └──────────────┘ └──────────┘
▼ (if violations)
┌──────────────┐
│ FAIL BUILD │
│ + Report │
└──────────────┘

name: Crypto Compliance Check
on:
pull_request:
branches: [main]
push:
branches: [main]
jobs:
cbom-check:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Build Application
run: ./gradlew build
- name: CBOM Compliance Check
uses: qcecuring/cbom-action@v1
with:
api-url: ${{ secrets.CBOM_API_URL }}
api-key: ${{ secrets.CBOM_API_KEY }}
policy: "NIST-PQC"
fail-on-violation: true
scan-path: "./build/libs"
- name: Upload CBOM Report
if: always()
uses: actions/upload-artifact@v4
with:
name: cbom-report
path: cbom-report.json

cbom-compliance:
stage: test
image: qcecuring/cbom-scanner:latest
script:
- cbom scan --path ./build --output cbom-report.json
- cbom assess --report cbom-report.json --policy NIST-PQC --fail-on-violation
artifacts:
reports:
cbom: cbom-report.json
variables:
CBOM_API_URL: $CBOM_API_URL
CBOM_API_KEY: $CBOM_API_KEY

pipeline {
agent any
stages {
stage('Build') {
steps {
sh './gradlew build'
}
}
stage('CBOM Compliance') {
steps {
withCredentials([string(credentialsId: 'cbom-api-key', variable: 'CBOM_API_KEY')]) {
sh '''
cbom scan --path ./build/libs --output cbom-report.json
cbom assess --report cbom-report.json \
--api-url ${CBOM_API_URL} \
--api-key ${CBOM_API_KEY} \
--policy NIST-PQC \
--fail-on-violation
'''
}
}
}
}
post {
always {
archiveArtifacts artifacts: 'cbom-report.json'
}
}
}

OptionDescriptionDefault
api-urlCBOM platform API endpointRequired
api-keyAPI authentication keyRequired
policyPolicy name to evaluate against"default"
fail-on-violationWhether to fail the build on violationstrue
scan-pathPath to scan for crypto artifacts"."
severity-thresholdMinimum severity to trigger failure (CRITICAL, HIGH, MEDIUM, LOW)"HIGH"
output-formatReport format (json, sarif, cyclonedx)"json"

When violations are found, the action outputs a summary:

╔══════════════════════════════════════════════════════════════╗
║ CBOM Policy Check: FAILED ║
╠══════════════════════════════════════════════════════════════╣
║ Policy: NIST-PQC ║
║ Assets Scanned: 47 ║
║ Violations: 3 ║
╠══════════════════════════════════════════════════════════════╣
║ ❌ RSA-2048 key in /src/auth/jwt.config ║
║ → Quantum-vulnerable. Migrate to ML-KEM-768 ║
║ ❌ SHA-1 signature in /lib/legacy-signer.jar ║
║ → Deprecated. Use SHA-256 or SHA-3 ║
║ ❌ 3DES cipher in /config/payment-gateway.yml ║
║ → Prohibited. Use AES-256-GCM ║
╚══════════════════════════════════════════════════════════════╝

  • Shift-left crypto compliance — Catch quantum-vulnerable algorithms at PR time, not in production audits
  • Prevent weak algorithms — Block SHA-1, 3DES, RC4, and other deprecated crypto from entering the codebase
  • Enforce PQC migration — Require post-quantum algorithms for new services while tracking legacy exceptions
  • Audit trail — Every build produces a CBOM report for compliance evidence