Runtime Software Composition Analysis
Identify and manage vulnerabilities in open source components and libraries used by an application at runtime.
Traditional SCA identifies third-party dependencies during the build process, which can lead to an overwhelming number of results. Runtime SCA refines this data by monitoring applications during execution to identify which libraries are actively loaded. By distinguishing between referenced code and used code, you can focus remediation on the components that pose a real-world risk.
Key benefits
- Operational accuracy: Distinguish between inactive dependencies and active, high-risk libraries.
- Risk prioritization: Gain deeper context into vulnerabilities to streamline your remediation backlog.
- Production insights: Use
IAST_SCA_PRODto monitor production environments with minimal overhead by disabling full security testing in favor of library detection.
Implementation workflow
- Deploy the IAST agent.
Install the IAST agent onto your application server.
- Configure environment variables.Enable runtime detection by adding one of the following variables to your IAST configuration file:
Variable Environment Description IAST_RUNTIME_SCATesting/Staging Enables full IAST capabilities alongside runtime library detection. IAST_SCA_PRODProduction Disables standard IAST features, leaving only library detection active. - Exercise the application.The agent must see the application in use to identify loaded libraries. You can trigger this by:
- Running automated functional or regression tests.
- Performing a dynamic (DAST) scan.
- Manually exploring the application.
- Correlate and review results.
After the agent has monitored the application, run a standard SCA scan. ASoC automatically correlates the static scan findings with the agent's runtime data. Confirmed active libraries are then displayed in a correlation group for easy identification.