Skip to main content

Applying rules to a policy

When creating a policy, you can add several rules that applications must follow to pass the policy.

You can also apply rules with the Policy API.

RuleDescriptionApplies to Static Analysis, Dynamic Analysis, and Manual Penetration Testing scansApplies to Software Composition Analysis (SCA) scans
Minimum Scan ScoreEnter a value between 1 and 100. To pass policy, applications must meet or exceed the specified score value.X
Security StandardSelect one or more of these security standards: PCI, OWASP, OWASP Mobile, CWE Top 25, or CERT. To pass policy, applications must not contain any findings defined in the selected standards.

If you select the Auto-Update OWASP, Auto-Update CWE Top 25, or Auto-Update CERT requirement, Veracode automatically reassesses the application when it implements a new version of that specific standard. If you select the Auto-Update PCI requirement, Veracode automatically reassesses the application when it implements a new version of the OWASP, CWE Top 25, or CERT standards.

CWEs That Violate Security Standards provides the full list of CWEs that can prevent an application from passing security standard rules in policies.
X
Findings with CWE IDSearch in the CWEs table and select one or more CWE IDs. To pass policy, applications must not contain the specified CWE IDs.X
Findings in CWE CategorySelect one or more CWE categories. To pass policy, applications must not contain CWEs in the specified categories.X
Findings within Scan TypeSelect one or more of these scan types: Static Analysis, Dynamic Analysis, or Manual Penetration Testing. To pass policy, applications must not contain findings from one or more of the specified scan types.X
Findings by SeveritySelect the scan type options and select a severity rating. To pass policy, applications must not contain any findings that meet or exceed the specified severity rating for the specified scan types.XSCA upload scans only
Component Blocklist EnforcementTo pass policy, applications must not contain any findings from your organization blocklist. The list of blocklisted components appears after you add this rule.SCA upload scans only
Vulnerability CVSS ScoreSelect a CVSS score. To pass policy, applications must not contain any findings that meet or exceed the specified CVSS score. To avoid having conflicting requirements, do not include a Findings by Severity rule for Veracode SCA findings in your policy.SCA upload scans only
Vulnerability Severity1Select the severity rating to disallow. In the Advanced Options section, you can apply these additional configurations:
  • Component Dependency.
  • Build Action.
  • Override Severity.

Note: You must create a separate Vulnerability Severity rule for each set of unique inputs. The inputs are Severity, Vulnerable Method, and Component Dependency. The outputs are Build Action, Create Issue, which is automatic and not configurable, and Override Severity of the created issue.
SCA agent-based scans only
Component LicensesSelect the license risk ratings to disallow. In the Advanced Options section, you can apply these additional configurations:
  • Specify the type of component dependency.1
  • Specify the build action.1
  • Override severity ratings.1
  • Disallow non-OSS licenses.
  • Disallow Unrecognized licenses.
  • For components with multiple licenses, require one or all of the licenses to meet the rule requirements.
  • Allow specific licenses that do not meet the other rule requirements. (This configuration only applies to findings from Veracode SCA upload scans.)
  • Disallow specific licenses that do meet the other rule requirements.
Both SCA upload scans and agent-based scans
Component Versions1Create issues whenever an SCA agent-based scan finds an outdated library. In the Advanced Options section, you can apply these additional configurations:
  • Vulnerable methods
  • Component dependency
  • Build action
  • Override severity
SCA agent-based scans only

1 Rules and advanced options are available after activating the Unified Policy feature.