Skip to main content

Built-in security policies

To help organizations begin evaluating their applications against security standards, we provide pre-configured built-in policies that you can assign to your applications or assign to your SCA agent workspaces.

Built-in policies are available for Static Analysis, Dynamic Analysis, SCA Agent-based Scan.

You can set a built-in policy as the default policy for newly created applications or workspaces.

note

The constraints are pre-defined in the built-in policies, which you can't change, but you can create a copy of a built-in policy, to create a custom policy, and configure the constraints in the copy.

Recommended policies assess your applications based on their business criticality. Once your teams are familiar with these policies, consider creating your own custom policies.

The following table lists the recommended policies. To learn about the Target VL (Veracode Levels), see About Veracode Levels.

note

The recommended policies are named after Veracode's business criticality ratings, not finding severity ratings.

Policy nameTarget VLFlaw severitiesMinimum scoreScan requirementGrace period
Veracode Recommended Very HighVL5No Medium or above90Static (quarterly)
Manual (annually)
0
Veracode Recommended HighVL4No Medium or above80Static (quarterly)0
Veracode Recommended MediumVL3No High or above70Static (quarterly)0
Veracode Recommended LowVL2No Very High or above60Any (semi-annually)0
Veracode Recommended Very LowVL1Any (once)0
Veracode Recommended Very High + SCAVL5+SCANo Medium or above90Static (quarterly)
Manual (annually)
0
Veracode Recommended High + SCAVL4+SCANo Medium or above80Static (quarterly)0
Veracode Recommended Medium + SCAVL3+SCANo High or above70Static (quarterly)0
Veracode Recommended Mobile PolicyStatic (quarterly)0
PCI 3.2.1No High or above
OWASP Top 10
CWE Top 25
CERT
Any (once)0

Veracode transitional policies

Transitional policies are no longer recommended. They were originally created to establish a baseline Security Quality Score for applications without policies.

note

Transitional policies don't support grace periods. Without a grace period, the Security Quality Score is effective as soon as the scan results are published.

The following table lists the transitional policies. To learn about the Target VL (Veracode Levels), see About Veracode Levels.

Policy nameTarget VLMinimum scoreScan requirementGrace period
Veracode Transitional Very HighVL190Any (Once)0
Veracode Transitional HighVL180Any (Once)0
Veracode Transitional MediumVL170Any (Once)0
Veracode Transitional LowVL160Any (Once)0
Veracode Transitional Very LowVL150Any (Once)0

Built-in policy for SCA Agent-based Scan

By default, the Veracode Platform applies the Veracode Recommended SCA Very High policy to SCA agent workspaces.

The following table lists the rules in this policy.

Rule typeRequirementAdvanced options
Findings by SeverityLow and above are not allowedNot applicable. This rule does not apply to SCA agent-based scans.
Vulnerability SeverityVery High are not allowedVulnerable Methods: Any
Dependency: Any
Fix Available: Any
Build Action: Warning
Override Severity: No
Vulnerability SeverityHigh are not allowedVulnerable Methods: Any
Dependency: Any
Fix Available: Any
Build Action: Warning
Override Severity: No
Vulnerability SeverityMedium are not allowedVulnerable Methods: Any
Dependency: Any
Fix Available: Any
Build Action: Warning
Override Severity: No
Vulnerability SeverityLow are not allowedVulnerable Methods: Any
Dependency: Any
Fix Available: Any
Build Action: Warning
Override Severity: No
Component LicenseHighDependency: Direct
Non-OSS Licenses
Unrecognized Licenses: Allowed
Component with Multiple Licenses: All licenses must meet requirements
Build Action: Warning
Override Severity: No
Component VersionOutdatedDependency: Direct
Build Action: Warning
Override Severity: No