Application Security (3), Open Source Security --- Sonatype

This series of articles, based on my previous working notes, discusses the main feature of the application security protection. The procedure is a security checking automation to figure out the potential security issues and give the developer a chance to fix them. My previous Security series of articles, such as Example Of Cross-Site Scripting, Reflected, was based on the security scanning tools to detect issues and to indicate the possible security vulnerabilities and solutions.

A - Introduction

This article's topic list is

  • A - Introduction
  • B - Sonatype Overview
  • C - Sonatype Scanning and Reporting
  • D - Sonatype CI/CD
  • E - Sonatype Major Source
  • F - Sonatype Credentail Setup

These contents were from my learning notes.

B - Sonatype Overview

C - Sonatype Scanning and Reporting

Scanning:

We use the same scanner as Fortify uses, while the types indicate:

  • SCA (Static Code Analysis) --- Fortify
  • OSS (Open Source Security) --- Sonatype 
  • DAST (Dynamic App Sec Testing) --- WebInspect

Fortify Scanning (SCA):

WebInspect Dynamic Scanning:

Sonatype Reporting:

The reporting interface is from Sonatype associated with the ananlysis and reporting tools. Click view Report will go to the detailed Report Result.

D - Sonatype CI/CD

E - Sonatype Major Source

F - Sonatype Credential setup

From within DevOps => Pipelines => Choose a Specific Project Pipeline => Edit:

In the Task page => Choose Sonatype (Nexus IQ policy evaluation) => Click Manage

Click an existing Sonatype link:

Give credentials:

For a new connector:

We have:

References:


Similar Articles