Summary
HCL AppScan Cloud (DAST findings) can be integrated with the Centraleyezer Vulnerability Management platform to streamline the import of vulnerability data. This integration helps businesses efficiently identify, prioritize, track, and remediate security vulnerabilities.
Key Features
Data Import:
Import applications, scan summaries, and application-vulnerable items into your Centraleyezer instance either on-demand or based on pre-configured automated schedules.
Detailed Findings:
Complete request/response information for DAST vulnerabilities is provided by Centraleyezer.
Risk Scoring:
Configurable severity value for HCL AppScan Cloud (DAST findings) assessments, which can be adjusted based on organizational risk policies.
Selective Data Import:
Supports configuration filters based on status, scan type, and severity for selective data import.
Must-Have Connection:
An HTTPS connection is required, with or without a proxy.
Considerations
The plugin supports mapping one HCL AppScan Cloud Server with one Centraleyezer instance. Configuring a different AppScan Cloud Server in the plugin will overwrite previously imported data.
Requirements
System Requirements
Centraleyezer Prerequisites:
Latest version of the Centraleyezer Vulnerability Management Platform is recommended.
AppScan Cloud Prerequisites:
HCL AppScan Cloud version 1.3.0 or newer, with API access.
Permissions and Roles
System Admin (admin) or Application Security Manager (part of App-Sec Manager group) permissions required.
HCL AppScan Cloud user access for DAST scan information.
Permissions must be assigned to “admin” for import mappings.
Release Notes
Version 1.0.0
Mapped vulnerabilities from HCL AppScan during DAST scans with the following fields:
Name: IssueType
CVE: Cve
CVSS: Cvss
CWE: Cwe
Asset: Constructed from scheme, domain, and path.
Severity: Severity
CVSS3 Score: cvss3_score
Protocol: protocol (defaults to ‘N/A’ if not specified)
Port: Port (defaults to 0 if not specified)
Targets: Includes location, element type, and element details.
Import Vulnerability ID: IssueTypeId
Permissions: Required to access import mappings.
Summary
HCL AppScan Cloud (SAST findings) can be integrated with the Centraleyezer Vulnerability Management platform to streamline the import of vulnerability data. This integration helps businesses efficiently identify, prioritize, track, and remediate security vulnerabilities.
Key Features
Data Import:
Import applications, scan summaries, and application-vulnerable items into your Centraleyezer instance either on-demand or based on pre-configured automated schedules.
Detailed Findings:
Complete request/response information for SAST vulnerabilities is provided as an attachment by Centraleyezer.
Risk Scoring:
Configurable severity value for HCL AppScan Cloud (SAST findings) assessments, which can be adjusted based on organizational risk policies.
Selective Data Import:
Supports configuration filters based on status, scan type, and severity for selective data import.
Must-Have Connection:
An HTTPS connection is required, with or without a proxy.
Considerations
The plugin supports mapping one HCL AppScan Cloud Server with one Centraleyezer instance. Configuring a different AppScan Cloud Server in the plugin will overwrite previously imported data.
Requirements
System Requirements
Centraleyezer Prerequisites:
Latest version of the Centraleyezer Vulnerability Management Platform is recommended.
AppScan Cloud Prerequisites:
HCL AppScan Cloud version 1.3.0 or newer, with API access.
Permissions and Roles
System Admin (admin) or Application Security Manager (part of App-Sec Manager group) permissions required.
HCL AppScan Cloud user access for SAST scan information.
Permissions must be assigned to “admin” for import mappings.
Release Notes
Version 1.0.0
Mapped vulnerabilities from HCL AppScan during SAST scans with the following fields:
Name: IssueType
CVE: Cve
CVSS: Cvss
CWE: Cwe
Asset: Constructed from scheme, domain, and path.
Severity: Severity
CVSS3 Score: cvss3_score
Protocol: protocol (defaults to ‘N/A’ if not specified)
Port: Port (defaults to 0 if not specified)
Targets: Includes location, element type, and element details.
Import Vulnerability ID: IssueTypeId
Permissions: Required to access import mappings.