Skip to content

Latest commit

 

History

History
45 lines (26 loc) · 2.65 KB

File metadata and controls

45 lines (26 loc) · 2.65 KB

Application Security Settings

Application Security Settings involves a comprehensive set of practices and tools aimed at ensuring the security of applications throughout their development lifecycle. This includes various components such as IaC Security, Software Composition Analysis (SCA), Secrets Security, and CI/CD Security.

What do you want to do?

Start here

Enable Application Security Subscriptions

Application Security has four license types billed by developer credits. Learn more on the a la carte license offerings for Application Security.

Enable Notifications

Enhance Code and CI/CD Security by enabling notifications for external integrations like JIRA, ServiceNow, Microsoft Teams, Slack, Splunk, and Webhook.

Exclude Paths

Define paths to exclude for scans and specify repositories for targeted applications. This helps in noise reduction and effective prioritization of issues.

Scan Git History for Secrets

Prima Cloud leverages service provider APIs to verify the authenticity and integrity of secrets discovered within the codebase. This process serves as a crucial step in prioritizing security measures. By confirming the validity of these secrets, you can allocate resources and attention to the most pressing security concerns, ensuring a focused and effective approach to safeguarding sensitive information.

Validate Secrets

Enabling Git History scanning empowers you to uncover any secrets that may have been removed from the repository but remain accessible in its history. This ensures a comprehensive security sweep for vulnerabilities in potentially forgotten or overlooked access points.

In addition to these configurations you can enable Developer Suppressions. By enabling this configuration, any suppressions specified in the code will be disregarded while a routine and thorough scan of associated resources will continue. This ensures that no potential issues or vulnerabilities are overlooked, bolstering the overall security posture of the system.