Skip to main content
Version: 1.4

Security Rules

The system provides the ability to create exclusion rules for working with results in the product. The Security Rules section is designed for managing security rules that apply to vulnerabilities and other security issues in projects. This allows for temporarily or permanently ignoring certain types of issues based on their priority or other criteria. Security Rules

This section is intended for managing rules that apply to vulnerabilities and other security issues in projects.

Security Rules Table Structure

ColumnDescription
NameName or identifier of the security rule
CategoryCategory of the issue to which the rule applies
ComponentSystem component or repository path
CVEUnique vulnerability identifier in the CVE database
CWECWE (Common Weakness Enumeration) code
StatusRule activity status
Number of ApplicationsNumber of times the rule has been applied
Expiration DateRule expiration time
ScopeProject scope

Capabilities:

  • Temporary or permanent issue ignoring
  • Configuring scope (projects/repositories)
  • Management by vulnerability priority/type

Creating a Security Rule

Creating a security rule is based on specified parameters. The set of parameters depends on the type of security issue. To create a rule, follow these steps:

  1. In the Security Rules section, click the Add Rule button
  2. Fill out the form with the following data:
    • Name - Unique rule name
    • Security Check Type
    • Tool
    • Issue Category
    • System Component/path
    • CVE identifier
    • CWE code
    • File/directory Path
    • Vulnerability Code Security Rules
  3. Configure additional parameters:
    • Expiration Time: fixed date or indefinite
    • Security Issue Status: from available options
    • Application Scope: project selection
    • Status After Expiration: from available options
  4. Click the Create button
caution

Rules apply to all new and existing issues that match the criteria.

Key Features

  • Flexible exception configuration
  • Centralized vulnerability management
  • Support for temporary and permanent rules
  • Binding to specific projects