Skip to main content

Built-in security policies

Veracode provides built-in policies to help organizations begin evaluating their applications against security standards. There are two sets of built-in policies for Static Analysis and Dynamic Analysis scans, and one built-in policy for SCA agent-based scans.

You can set a built-in policy as the default policy in your policy settings, or you can create custom policies.

Recommended policies assess your applications based on their business criticality. Once your teams are familiar with these policies, consider creating your own custom policies.

The following table lists the recommended policies.

Policy nameTarget VL1Flaw severitiesMinimum scoreScan requirementGrace period
Veracode Recommended Very HighVL5No Medium or above90Static (quarterly)
Manual (annually)
0
Veracode Recommended HighVL4No Medium or above80Static (quarterly)0
Veracode Recommended MediumVL3No High or above70Static (quarterly)0
Veracode Recommended LowVL2No Very High or above60Any (semi-annually)0
Veracode Recommended Very LowVL1  Any (once)0
Veracode Recommended Very High + SCAVL5+SCANo Medium or above90Static (quarterly)
Manual (annually)
0
Veracode Recommended High + SCAVL4+SCANo Medium or above80Static (quarterly)0
Veracode Recommended Medium + SCAVL3+SCANo High or above70Static (quarterly)0
Veracode Recommended Mobile Policy   Static (quarterly)0
PCI 3.2.1No High or above
OWASP Top 10
CWE Top 25
CERT
Any (once)0

1Refer to Target Veracode Levels for more details.

Veracode transitional policies

Transitional policies are no longer recommended. They were originally created to establish a baseline Security Quality Score for applications without policies.

note

Transitional policies don't support grace periods. Without a grace period, the Security Quality Score is effective as soon as the scan results are published.

The following table lists the transitional policies.

Policy nameTarget VLMinimum scoreScan requirementGrace period
Veracode Transitional Very HighVL190Any (Once)0
Veracode Transitional HighVL180Any (Once)0
Veracode Transitional MediumVL170Any (Once)0
Veracode Transitional LowVL160Any (Once)0
Veracode Transitional Very LowVL150Any (Once)0

Built-in policy for SCA agent-based scans

By default, Veracode applies the Veracode Recommended SCA Very High policy to SCA agent-based workspaces.

The following table lists the rules in this policy:

Rule typeRequirementAdvanced options
Findings by SeverityLow and above are not allowedNot applicable. This rule does not apply to agent-based scans.
Vulnerability SeverityVery High are not allowedVulnerable Methods: Any
Dependency: Any
Fix Available: Any
Build Action: Warning
Override Severity: No
Vulnerability SeverityHigh are not allowedVulnerable Methods: Any
Dependency: Any
Fix Available: Any
Build Action: Warning
Override Severity: No
Vulnerability SeverityMedium are not allowedVulnerable Methods: Any
Dependency: Any
Fix Available: Any
Build Action: Warning
Override Severity: No
Vulnerability SeverityLow are not allowedVulnerable Methods: Any
Dependency: Any
Fix Available: Any
Build Action: Warning
Override Severity: No
Component LicenseHighDependency: Direct
Non-OSS Licenses
Unrecognized Licenses: Allowed
Component with Multiple Licenses: All licenses must meet requirements
Build Action: Warning
Override Severity: No
Component VersionOutdatedDependency: Direct
Build Action: Warning
Override Severity: No

See Security Policy Constraints for more information about these rules.