SCA workflow and best practices
Overview of steps for Software Composition Analysis scanning and best practices
The general steps for performing SCA scanning are as follows. Additional steps may be required to meet your scanning goals.
Note: Users must be assigned an appropriate role to perform SCA scanning. If
you are unsure whether your user role has appropriate permissions, consult your
organization's ASoC Administrator.
- Create an application.
- Decide which mechanism you will use to prepare files for scanning and set it up
accordingly:
- Static Analyzer Command Line Utility
- AppScan Go!
- a supported plugin
- Generate an IRX using your preferred method.
- Create and configure a scan.
- Review scan preferences.
- Run the scan.
- Review results.
- Triage and remediate issues.
- Repeat steps three through eight as needed.
Best practices
By following these best practices, you can optimize the effectiveness of SCA in identifying and mitigating vulnerabilities within your project's open-source components:
- For projects utilizing package managers, SCA can construct a detailed dependency
tree, offering insights into both direct and transitive dependencies. Scanning
package manager configuration files yields more accurate results than scanning
source files alone, as most dependencies are resolved only after the project is
built using the package manager.Note: Location of packages sourced in configuration scanning will point to the configuration files and not the physical location of the libraries.
- When only package management files are present (no lockfiles), the AppScan CLI attempts to build the project using available local build tools to ensure all dependencies are resolved. It is always better to build your own projects.
- If no configuration files and lockfiles are detected, SCA default to best effort scanning, utilizing individual source files by hashing each file and comparing it against known data sources.