You can configure a Dynamic Analysis with Veracode Internal Scanning Management (ISM) to scan web applications hosted within a corporate firewall and inaccessible to the public internet.
The steps in this use case configure a Dynamic Analysis for scanning using Veracode Internal Scanning Management with authentication. The URL is behind a firewall and is not externally accessible. For more information, see About Internal Scanning Management.
For information about Veracode API Scanning, see create an API specification scan.
Before you begin:
- You have reviewed the prerequisites.
- You have configured your ISM gateway and endpoint according to:
To complete this task:
In the Veracode Platform, select Scans & Analysis > Dynamic Analysis.
The All Dynamic Analyses page opens.
Select Scan Web Applications.
Enter a name for the Dynamic Analysis. Use a name that uniquely identifies the analysis within your organization. For example, use the scan name, the team, or business unit responsible for this application as the name of the Dynamic Analysis.
From the URLs/Applications dropdown menu, select Enter URLs and enter a single URL, such as
https://www.example.com, and select Add.
In the Scanning Certification section, select the checkbox to confirm that your organization has the right to scan the URLs you provided.
Optionally, configure additional settings for each URL. If your analysis has several URLs, you can use the search field to find a specific URL.
Select Configure at the bottom of the page.
Select the pencil icon at the end of URL row to edit a specific URL configuration.
In the Blocklist tab of the URL-Specific Blocklist and Allowlist section, select Exclude the following URLs to create a blocklist.
If you want to ensure that Veracode does not scan specific URLs, you can add them to the analysis blocklist by selecting the option Exclude the following URLs. Enter the filepath or directory path of the URLs you want to exclude from this analysis. If you enter a directory path, everything in that directory and its subdirectories are excluded. You must include the slash at the end of the URL for the analysis to consider it a directory instead of a file.
Add allowed host URLs in the Allowlist tab to ensure Veracode can scan the entire application.
By default, the Dynamic Analysis scans all subdirectories under the top-level domain. Because Veracode does not automatically scan the subdomains, you can include them in the scope of the scan by specifying them in the Allowlist tab. You can also change the scope of the URL scan by excluding the HTTP or HTTPS versions.
You can also change the scope of the scan by adding a subdirectory to a URL. For example, if you add
https://api.example.com/mydir/v1, the subdirectory
/mydir/v1in the subdomain
apiis now in scope. If you want to scan all subdirectories under
api, omit the subdirectory and add
https://api.example.com. Veracode recommends that you only add the specific subdirectories that you want to scan instead of adding the entire directory.
Select and configure an authentication method for accessing your application.
Select the gateway associated with an endpoint that can access the URL. If you select a gateway that is not associated with an accessible endpoint or is not ready for scanning, the Dynamic Analysis fails.
Select an endpoint that can access the URL. If you select an endpoint that is not reachable by the URL or is not ready for scanning, the Dynamic Analysis fails. Endpoints are identified as Ready, Pending, or Offline.
When you are ready to run it, you can start your Dynamic Analysis immediately or schedule it to run at a date up to 60 days in the future. By default, your Dynamic Analysis is not scheduled.
Go to the All Dynamic Analyses page, which lists all your scans and their statuses.
From the Actions menu at the end of the row, select View Analysis Results.
The results open in the Triage Flaws view of the selected Dynamic Analysis, listing all detected vulnerabilities.
You can link results from a Dynamic Analysis to an application profile to evaluate the results against policy, and see the results for all types of scans of the application aggregated in a single report.
Select the Dynamic Analysis Results tab of the analysis summary page and select Actions > Link to Application.
The Link to Application window opens.
From the list of applications, select the application to which to link scan results. You cannot select an application that is already linked to a URL configuration.