-
Notifications
You must be signed in to change notification settings - Fork 87
CxSCA Integration
- Configuration
- Bug-Trackers
- Filters
- Thresholds
- Policy Management
- Configuration As Code
- SCA Scans From Command Line
- SCA ZIP Folder Scan
- SCA Project Team Assignment
- SCA Scan Timeout
- SCA Resolver
- SBOM
CxSCA scans can be triggered based on WebHooks using CxFlow. For instructions on registering CxFlow to WebHook, refer to WebHook Registration.
Select the vulnerability scanner by adding the following property to the CxFlow section. You can choose to trigger a CxSAST scan a CxSCA scan or both. The example below has been set to trigger both CxSCA and CxSAST.
enabled-vulnerability-scanners:
- sca
- sast
In addition, add a CxSCA section with the following properties:
sca:
appUrl: https://sca.checkmarx.net
apiUrl: https://api-sca.checkmarx.net
accessControlUrl: https://platform.checkmarx.net
tenant: your-tenant
username: username
password: xxxxx
team: "/CxServer/MyTeam/SubTeam"
projectName: "sampleProjectName"
include-sources: true
exclude-files: "**/*.xml"
manifests-include-pattern: "!**/*.xml, **/*.yml"
fingerprints-include-pattern: "**/*.yml"
preserve-xml: true
project-tags: "k1:k2,dev"
scan-tags: "s1:s2,p1:p2,prod"
filter-severity:
- High
filter-policy-violation: true
//If User want to check for Direct Dependency specifically below tag can be used and default value is All.
filter-dependency-type: Direct
//Based on threshold severity it will break build even for Direct Dependency.
thresholds-Severity:
HIGH: 1
MEDIUM: 150
LOW: 1
In addition, add one of the CxSCA sections with the following properties:
sca:
appUrl: https://eu.sca.checkmarx.net
apiUrl: https://eu.api-sca.checkmarx.net
accessControlUrl: https://eu.platform.checkmarx.net
tenant: your-tenant
username: username
password: xxxxx
team: "/CxServer/MyTeam/SubTeam"
include-sources: true
exclude-files: "**/*.xml"
manifests-include-pattern: "!**/*.xml, **/*.yml"
fingerprints-include-pattern: "**/*.yml"
preserve-xml: true
project-tags: "k1:k2,dev"
scan-tags: "s1:s2,p1:p2,prod"
filter-severity:
- High
filter-policy-violation: true
SCA integration supports tickets management with the following bug trackers:
- Jira
- GitLab
- Azure
- GitHub
- CxXML
The tickets format is the same for each of the bug trackers.
CxFlow can open Jira tickets according to the CxSCA scan results. Currently, CxFlow opens a limitation per vulnerability severity found in a package.
+++ The section below is still under development +++
CxFlow opens a separate ticket for each vulnerability type found in a package of a specific project.
The ticket is structured as follows:
<Severity> Risk Vulnerability: <**vulnerabilityId**> in <**package name and version**> @ <**Repo.branch**>
CxFlow SCA scans Jira's tickets based on both vulnerabilityId & PackageId.
This means that each vulnerabilityId with a different packageId has its own ticket.
The following correlation exists between pull requests processed via GitHub and Jira:
- Red section: There are two vulnerabilities, each with the same Id, but each one has a different package. Therefore two matching tickets are expected on the Jira side.
- Blue section:There are four vulnerabilities, each with a different Id, but each one has the same package. Therefore four matching tickets are expected on the Jira side.
Jira ticket example:
Following Properties of SCA Results can now be mapped to jira issues:
- type: sca-results
name: package-name
jira-field-name: Package Name
jira-field-type: label
- type: sca-results
name: current-version
jira-field-name: Current Version
jira-field-type: label
- type: sca-results
name: fixed-version
jira-field-name: Fixed Version
jira-field-type: label
- type: sca-results
name: newest-version
jira-field-name: Newest Version
jira-field-type: label
- type: sca-results
name: locations
jira-field-name: Locations
jira-field-type: label
- type: sca-results
name: risk-score
jira-field-name: Risk Score
jira-field-type: label
- type: sca-results
name: dev-dependency
jira-field-name: Development
jira-field-type: single-select
- type: sca-results
name: direct-dependency
jira-field-name: Direct
jira-field-type: single-select
- type: sca-results
name: outdated
jira-field-name: Outdated
jira-field-type: single-select
- type: sca-results
name: violates-policy
jira-field-name: Violates Policy
jira-field-type: single-select
SCA filtering has 2 sections: filter-severity, filter-score & filter-policy-violation:
- Filter Severity: is a list type and can have multiple values [high, medium, low] regardless the order and not case sensitive. When applying this filter the SCA results vulnerabilities will be sanitized according to the severities defined filter.
- Special cases:
- Filter not defined: in that case the severity filter won’t be applied and the returned results will contain all scan severities.
- Unrecognized filter defined: in that case this filter value will be ignored.
- Special cases:
- Filter Score: is a double value starting from ‘0.0’.
- Special cases:
- Negative value will be ignored.
- Filter not defined: in that case the score severity won’t be applied and the returned results will contain all scan scores.
- Special cases:
- Combined filters: In case both severity & score filter were defined, the returned results will contain only vulnerabilities which apply both conditions.
- Backwards Compatibility: in case none of the filters were defined, the returned results won’t be sanitized and all scan’s results will be returned
- Policy Violation filters: SCA vulnerabilities will be picked by Cxflow on violates any policy.Add a filter-policy-violation to the sca block that only validates vulnerabilities that breach Policy Violations.
- Backwards Compatibility: In case filters were not defined, the returned results won’t be sanitized and all scan’s results will be returned
sca:
filter-policy-violation: true
Cx-Flow supports 2 kind of thresholds:
- Severity Thresholds (count per severity):
- Score Threshold
When performing a scan, if at least one of the thresholds is violated, Cx-Flow will fail the pull request and it will be marked as failed.
The thresholds feature is supported in the following source-code managements:
- ADO
- GitHub
- BitBucket
Thresholds are configured in the application.yml within the sca section:
- Define the block-merge with true value
- Define the error-merge with true value
Cx-Flow uses the thresholds to ease its (no) tolerance of findings.
- Severity – this threshold tells Cx-Flow what is the maximum number of findings (per severity) allowed, before failing the pull request.
- Score – this threshold tells Cx-Flow what is the maximum acceptable score (of all findings), before failing the pull request.
Note: - if only one threshold type is defined, the other one will be ignored
- that the thresholds are on findings and not on issues.
- if no threshold is defined, cx-flow will fail the pull request if there is any finding.
- thresholds are checked after the execution of filters.
An example for pull request failure:
SCA supports with policy management control. Each policy can be customized by defining number of custom rules and conditions in which, if getting violated, can break a build. On the creation process or after it, a policy can be defined with 'Break build' flag or not.
When performing a scan, if a defined policy is getting violated, Cx-Flow will fail the pull request and it will be marked as failed.
- Violated policy occurs when at least one rule condition is getting violated AND when policy 'Break Build' flag in on.
- In case of a CLI scan which violated a policy: Cx-Flow will fail with exit code 10.
- If current scan violated any active SCA thresholds and also violated a policy, policy break build has the top priority.
CxFlow supports configuration as code for CxSAST and CxSCA scans.
Available overrides for SCA properties:
- additionalProperties:
- vulnerabilityScanners
- sca:
- appUrl
- apiUrl
- accessControlUrl
- tenant
- thresholdsSeverity
- thresholdsScore
- filterSeverity
- filterScore
- team (needs to be set with none empty value)
- excludeFiles
- ManifestsIncludePattern
- fingerprintsIncludePattern
Example for SCA config file content:
{
"additionalProperties": {
"cxFlow": {
"vulnerabilityScanners": ["sca", "sast"]
}
},
"sca": {
"appUrl": "sampleAppUrl",
"apiUrl": "sampleApiUrl",
"accessControlUrl": "sampleAccessControlUrl",
"tenant": "sampleTenant",
"thresholdsSeverity": {
"HIGH": 10,
"MEDIUM": 6,
"LOW": 3
},
"thresholdsScore": 8.5,
"filterSeverity": ["high", "medium", "low"],
"filterScore": 7.5,
"excludeFiles": "**/*.xml",
"manifestsIncludePattern": "!**/*.xml, **/*.yml",
"fingerprintsIncludePattern": "**/*.yml",
"team": "/CxServer/MyTeam/SubTeam",
"projectName" : "SampleProjectName",
"expPathSastProjectName": "SampleProjectName",
"projectTags": "k1:k2,dev"
"scanTags": "s1:s2,prod,p1:p2"
}
}
When a configuration as code property is set, it will only override the corresponded global configuration property. In case of a list property (e.g. 'filterSeverity'), the whole global corresponded list will be overridden.
Note : expPathSastProjectName property is used for overriding --cxprojectname in SCA Resolver.
There are 2 options to add SCA scan to the cli run:
- Add scanner argument to the cli command: --scanner=sca
- Add sca to the active vulnerabilities scanner in CxFlow app.yml:
In order to open SCA security tickets, set the bug tracker in CxFlow app.yml file or in add the argument with your bug tracker type (for example: --bug-tracker=Jira)
- git scan:
- --scan --enabled-vulnerability-scanners=sca --app=MyApp --cx-project=test --repo-url=my-repo-url --repo-name=my-repo --branch=main --github
- local zip scan:
- --scan --app=MyApp --cx-team="my-team" --cx-project="project" --f="/Users/myProjects/project"
- get latest scan results:
- --project --app=MyApp --cx-team="my-team" --cx-project="project"
- EnabledZipScan:
- CxFlow will locally clone the repository and zip it and send the zip file for scanning.
enabled-zip-scan: true
When enabled-zip-scan
is set to true
then cx-flow will first clone the repository locally, and then it will zip the repository and send it for scanning.
Note: When enabled-zip-scan
is set to true
when working with GitLab pipeline then --gitlab
has to be passed in the CLI command, and in case of GitHub actions --github
has to be passed in the CLI command.
Additional configuration in SCA zip scan flow - Include source files
- Default value set to false, In order to change the default CxFlow SCA zip scan behavior, the next configuration property should be added underneath the sca configuration section:
include-sources: true
-
When includeSources is set to true cx-flow will consider all the files for scanning. If there is need to exclude files the exclude-files parameter is used. This parameter expects a regular expression for the files to be excluded. e.g
exclude-files: "**/*.xml"
will exclude all the .xml files present in the source folder. -
When includeSources is set to false cx-flow will consider the manifest-files and calculate fingerprint for it. If there is a need to exclude files then in this case the manifests-include-pattern and the fingerprints-include-pattern is used. These parameters also requires regular expression. e.g
manifests-include-pattern: **/*.xml, !**/*.yml
will include the all the xml file and exclude all the yml files.
Note The files to be excluded must begin with !. (Only applicable for manifests-include-pattern and fingerprints-include-pattern properties).
SCA project team assignment with CxFlow is performing on the SCA project creation stage. In order to set a project team, the next configuration property should be added underneath the sca configuration section:
team: /team
Or within a tree hierarchy:
team: /MainTeam/SubTeam
- In order to declare a team within a tree hierarchy, make sure to use the forward slash ('/').
- Declaring not existing team or team path will be resulted with 400 BAD REQUEST error.
In order to set Scan TimeOut for SCA, the configuration property should be added underneath the sca configuration section:
scan-timeout: 120
The Checkmarx SCA Resolver is an on-premises utility that allows you to extract dependencies and fingerprints from your source code and send them to the Checkmarx SCA cloud platform for risk analysis.
SCA Resolver also provide Exploitable Path feature which leverages SAST’s ability to scan the actual project code itself in parallel with scanning the manifest file, in order to validate whether the vulnerable open source packages are called from your proprietary code and whether the vulnerable methods are actually used by your code. Refer to Checkmarx SCA Resolver page for more information.
Prerequisites
-
Download and install the SCA Resolver for the appropriate operating system. SCA Resolver Download.
-
The SCA Resolver requires dependency resolution utilities to be installed and the project to be in a buildable state. For a list of requirements, see Package Managers Support in SCA Resolver.
-
Note: The SCA Resolver does not need to be downloaded if using Docker. The SCA Resolver will be located in the /app directory of the Docker image.
The SCA Resolver functions in offline mode when used in conjunction with Cx-Flow and the mandatory parameters like(-s ,-r, -n) are not required as Cx-Flow supplies all necessary information.
Please add the following configuration property underneath the "sca" configuration section:
sca:
enable-sca-resolver : true
If not using Docker, the path to the SCA Resolver must be configured using the following configuration property:
sca:
path-to-sca-resolver : "Path for Sca Resolver"
Note: To use SCA Resolver, include-sources must be set to false.
Prerequisites for exploitable path
- Checkmarx SAST details as Cx-FLow configuration through CLI or Yaml. Please refer to Configuration Page.
- Atleast one SAST Scan need to performed for project.
To enable the exploitable path in the SCA Resolver, the following configuration is needed:
sca:
enable-exploitable-path : true
Cx-Flow also supports additional parameters of SCA Resolver which can be configured using the following optional configuration property:
#Example for YAML
sca:
sca-resolver-add-parameters :
log-level : Debug
e : "*.ext1"
#Example for CLI
--sca.sca-resolver-add-parameters.log-level=Debug
--sca.sca-resolver-add-parameters.e=*.ext1
#Example for Environment variables
SCA_SCARESOLVERADDPARAMETERS_LOG-LEVEL=Debug
SCA_SCARESOLVERADDPARAMETERS_e=*.ext1
The value on the left side reflects the name of the SCA Resolver argument. The value on the right side reflects the SCA Resolver argument value. Refer to List of SCA Resolver Additional Parameters.
Note: (-- or - is not to be added in argument name)
All SCA Resolver custom parameters are special case for Cx-Flow.
To use custom parameters, the following configuration is needed:
sca:
sca-resolver-add-parameters :
custom-parameter : "--gradle-parameters=USERNAME=abc PASSWORD=cba"
Add the word "custom-parameter" to the left and the entire argument string to the right to add custom parameters to the SCA Resolver.
To override the project name in the SCA Resolver, the following configuration property can be used:
sca:
sca-resolver-override-project-name : <ProjectNameToOverride>
Project Name can also be overridden by config as code property. Please refer to SCA Config as Code and Config as Code chapter.
- The SCA Resolver logs can be viewed when the log level is set to Debug for Cx-Flow.
- Cx-Flow Removes all SCA Resolver logs.
- Note : if LogsDirectory is configured in Configuration.ini, The sca resolver's logs won't be deleted.
Software Bill of Materials (SBOM) - shows detailed info about each of the open source packages used by your program and the associated risks. SBOM Reports can be generated in JSON or XML format.
Cx-FLow can only generate SBOM reports in CLI mode.The --sbom
argument is required to produce an SBOM report.
Below are the application.yaml
properties that can be used to configure the SBOM:
sbom:
report-file-format: CycloneDxJson
json-file-name-format: "[NAMESPACE]-[REPO]-[BRANCH]-[TIME].json"
data-folder: "C:\\tmp"
hide-dev-and-test-dependencies: true
show-only-effective-licenses : true
Configuration | Default | Required | Command Line | Notes |
---|---|---|---|---|
report-file-format | CycloneDxJson | No | Yes | Report File format in which SBOM File need to be generated(CycloneDxJson,CycloneDxXml,SpdxJson) |
json-file-name-format | [APP]-[BRANCH]-[TIME].json | No | Yes | Only use this parameter with Report File format(CycloneDxJson,SpdxJson) |
xml-file-name-format | [APP]-[BRANCH]-[TIME].xml | No | Yes | Only use this parameter with Report File format(CycloneDxXML) |
data-folder | \tmp | No | Yes | Directory in which file need to be downloaded |
hide-dev-and-test-dependencies | false | No | Yes | Set this flag to true, if you want to exclude all development and test dependencies from the SBOM. |
show-only-effective-licenses | false | No | Yes | Set this flag to true, if you want to exclude all licenses that aren't marked as "Effective" from the SBOM. |
NOTE: json-file-name-format
and xml-file-name-format
allows for dynamic naming substitution.
File name follows a substitution pattern with the following elements:
[APP] → Application
[TEAM] → Checkmarx Team ( \ is replaced with _ in the filename)
[PROJECT] → Checkmarx Project [PROJECT] → Checkmarx Project
[NAMESPACE] → Checkmarx Project [PROJECT] → Org/Group/Namespace for the repo (if available)
[REPO] → Checkmarx Project [PROJECT] → Repository name (if available)
[BRANCH] → Checkmarx Project [PROJECT] → Branch name (if available)
[TIMESTAMP] → Current timestamp (yyyyMMdd.HHmmss format)