Follow this workflow to manage application security risks in your organization.
Learn how to measure progress and demonstrate compliance.
Learn how to demonstrate compliance.
Learn about Industry standard report.
Welcome to the HCL AppScan Enterprise 10.6.0 documentation, where you can find information about how to install, maintain, and use HCL AppScan Enterprise.
Accessibility features assist users who have a disability, such as restricted mobility or limited vision, to use information technology content successfully.
Learn general information about the product.
Learn how to install the product.
Learn how to upgrade the product.
Learn how to integrate the product with other solutions.
Learn how to extend the product with REST APIs and plugins.
Learn best practices for using the product.
Learn how to configure the product.
Learn how to administer the product.
Learn how to create an application inventory.
Learn how to test vulnerabilities identified in an application.
Learn how to determine risks and prioritize vulnerabilities identified in an application.
Learn how to remediate risks identified in an application.
Learn how to track various metrics and trends of the applications that compose your portfolio.
You can generate customized reports ( HTML, PDF, Excel, or XML) for issues and send them to developers, internal auditors, penetration testers, managers, and the CISO. The reporting templates in AppScan Enterprise map application security data to key government regulations and industry standards. Use the reports to document progress towards regulatory compliance goals, such as showing a reduction in the number of application vulnerabilities associated with compliance issues.
Security reports can be large. During report generation, you might receive a warning message that the file is hundreds of pages long, or the report creation process might time out. Try the following tips to reduce report size.
Learn about Compliance report.
This report displays existing web application vulnerabilities that violate this standard control objectives. The control objectives as listed in this standard are directly derived from and aligned with the control objectives listed in ISO 17799.
This report displays NERC Cyber Security Standards issues found on your site. Many web application vulnerabilities might lead to security breaches of personal information, directly or indirectly, and might be considered as violations of the regulation.
This report displays National Institute of Standards and Technology (NIST) issues found on your application. Many web application vulnerabilities might lead to security breaches of personal information, directly or indirectly, and might be considered violation of the regulation.
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to your web applications.
APIs, or application program interfaces, are vital tools for businesses in all industries. Since there is a rise in use of APIs in many domains and APIs are a critical part of modern mobile, SaaS and web applications, it is inevitable to release the importance of API security and its unique vulnerabilities as compared to web applications. OWASP API Security Top 10 report help developers, testers, and users — as well as project managers, security researchers, and educators — provide insight into the most severe and current security weaknesses related to APIs.
The OWASP Cloud-Native Application Security Top 10 is a resource that identifies the most critical security risks associated with cloud-native applications. It also details the challenges organizations face when securing these applications and provides guidance on mitigating those risks.
This report displays Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Weaknesses found on your site. The CWE Top 25 is a valuable community resource that can help developers, testers, and users — as well as project managers, security researchers, and educators — provide insight into the most severe and current security weaknesses.
This report displays WASC threat classification issues found on your site.
To help you understand, isolate, and resolve problems with your HCL® software, the troubleshooting and support information contains instructions for using the problem-determination resources that are provided with your HCL products.
Review reference information for the product.