Veracode Platform

The integration of Veracode with Archer Suite allows customers to automatically import comprehensive vulnerability scan assessment information into the Software Security Review application within Archer. This allows owners to report on vulnerabilities affecting their business-critical assets in one view. Users can assign ownership to the individual issues, track remediation efforts or accept the associated business risk.

Release history

Last updated: September 2020

New and changed features

  • This version of the integration leverages a script to generate and download the Archer report from the Veracode platform.

Known issues

If you are not using another source to populate application data other than Veracode, you may see Error in the Compliance Rating field.  If you are planning to use this field, review the out of the box calculation, and ensure that all supporting fields are being populated appropriately.

Overview

Key features and benefits

By using the two products together you can:

  • Centralize Risk Management – Organizations can leverage their Archer investment by automatically enabling Veracode's application risk intelligence into the Archer Platform to support the centralized management of business processes.

  • Measure Compliance – By leveraging Veracode's compliance reporting for application security, Archer customers will have a single view into their overall compliance with standards such as PCI.

  • Shorten Remediation and Mitigation Time – Archer users can shorten remediation cycles through automation of remediation workflow including assigning remediation tasks to mitigate software risks discovered by Veracode.

  • Automate Acceptance Processes – The Archer Platform allows organizations to set up acceptance thresholds for internal and third-party applications assessed by Veracode to automate the acceptance process.

Requirements

Components

Requirement

Archer Solution

IT & Security Risk Management

Archer Use Case

IT Security Vulnerabilities Program

Archer Applications

Applications

Uses Custom Application

Yes, Software Security Review

Requires On-Demand License

Yes, 1

Applications

Application

Description

Software Security Review

The Software Security Review application is used to manage the risk brought on by vulnerabilities of Applications being used by the company. This scan result information from Veracode can be used to track and mitigate those risks within Archer.

Applications

The Applications application stores all business applications used by the organization to perform business operations. Examples of applications include payment intake systems and customer account information systems. This repository allows you to view how an application is being used, the people who are using it and the devices supporting it.

Compatible Use Cases and Applications

Related Applications

Application

Use Case

Primary Purpose(s) of the Relationship

Findings

Issues Management

 

  • Mitigate findings through remediation tasks or exception requests. The system calculates residual risk and compliance status based on the resolution of findings

 

Remediation Plans

Issues Management

  • Review all findings, alerts and scan results related to a particular issue through one central location.

  • Provide users with an actionable, repeatable plan to respond to issues found during an audit or assessment.

Integration diagram

Additional resources

The following additional resources are available for this application:

Configuring Veracode Platform

This section provides instructions for configuring Veracode with the Archer Platform.  This document is not intended to suggest optimum installations or configurations. 

It is assumed that the reader has both working knowledge of all products involved, and the ability to perform the tasks outlined in this section. Administrators should have access to the product documentation for all products in order to install the required components.

All Veracode components must be installed and working prior to the integration. Perform the necessary tests to confirm that this is true before proceeding. 

Important: The integration described in this guide is being provided as a reference implementation for evaluation and testing purposes.  It may or may not meet the needs and use cases for your organization.  If additional customizations or enhancements are needed, it is recommended that customers contact RSA Professional Services for assistance.

Veracode provides Archer feeds that include information about the applications in an account. For assessments of internally developed or maintained applications, a feed includes scores, a listing of all discovered flaws, and status information about the flaws (new, open, fixed, or reopened). Summary data is included for third-party assessments, including scores and top-risk categories.

Customers who purchased a subscription that includes access to the Archer API can generate and retrieve Archer reports.

Task 1: Accessing the Archer API

To access the Archer API, you must have a non-human API account that has the Archer API role. To create the API customer account, perform the following step:

  1. Click the gear icon, then Admin to bring up the administrative interface.

  2. To create a new account for API access click Add. Click the API Account radio box to denote that this is a non-human user:

  3. Ensure that the Archer Report API button is selected as well, and click Save:

  4. Now that the API User account has been created, invoke the appropriate Archer API call to generate the Archer report for download via the Data Feed Manager.

Task 2: Generating a Veracode data file for Archer

To bring Veracode data into Archer, configure a client-side script that generates and downloads the data file using the Veracode Archer APIs.

  1. Download and install the Veracode script.

    1. Download the script from the Veracode Github account: https://github.com/veracode/veracode-archer. The sample script provided uses Python 3.x and the Veracode Authentication Tool.

    2. Configure the tool and install the required dependencies. Instructions for configuring the tool are in the readme of the script.

  2. Configure the Veracode API credentials on the server where the script will run using the information in the Veracode help.

  3. Schedule the script to run periodically, using a system utility such as cron.
    The default output of the consumable XML file is: archerreport.xml (same directory as the script).

You may need to change/specify the interval to get the data you are looking for. Instructions are in the readme of the script.

Any warnings/errors are logged in the vcarcher.log file.

The XML file will be overwritten as the script runs periodically.

Configuring Archer

To integrate the Archer framework and the Veracode service, the following is required:

  • Archer IT Security & Risk Management solution > IT Security Vulnerabilities Program Use Case

  • Veracode Software Security Review application (requires on-demand license)

To configure the Archer Platform, download the following component from the Archer Exchange:

Integration Modules

File Name

Description

Veracode_Software_Security_Review_1.2.zip

Software Security Review Application Package

The provided DFX file is configured to use both the Applications application and the application provided in the Software Security Review package (Software Security Review.zip).  Once imported, the Software Security Review application is added to the Veracode solution workspace tab (this can also be altered to fit your needs). Once the application is installed, numerous customizations are needed to complete the integration including creating a new sub-form and adding new fields to the Applications application.

Task 1: Installing the Software Security Review Application package

After downloading the integration files, import the application package to create the Software Security Review application.  Do the following:

  1. Login into Archer. Go to Administration > Application Builder > Install Packages.

  2. Click Import and browse to the Software Security Review package file (Veracode_Software_Security_Review_1.2.zip).

  3. Make sure all mappings in Package Mapper are correct before installing the package.

  4. Click Install to install the package.

  5. This process should complete without any errors. The package will install the Software Security Review application into the Veracode solution workspace (this workspace is optional).

Task 2: Creating the modules sub-form

To prepare for your integration with the IT Security & Risk Management solution you will need to add a sub-form, to the Applications application. This sub-form will allow you to import the modules associated with the application.

Important: This sub-form needs to be added to the Applications application.

To do this, perform the following steps:

  1. Go to the Archer platform, and click the Administration workspace tab.

  2. Click Application Builder in the Navigation Menu. A menu of Application Builder pages displays.

  3. Click the Manage Sub-Forms link. The Manage Sub-Forms page opens.

  4. Click New to add a new sub-form.

  5. Choose Create a new Sub-Form from scratch, and then click OK.

  6. In the Name field, enter Modules.

  7. Enter a description, if desired and then click the Layout tab.

  8. Create the fields listed in the table below and add them to the layout. Use the following names for the fields:

Field Type

Name

Values List

Analysis Type

Text

Architecture

Text

Compiler

Values List

Operating System

Text

Target URL

Text

Module

  1. Save the Sub-Form and exit.

Task 3: Adding fields to the Applications application

To prepare for your integration with the Enterprise Management solution, add a number of fields to the Applications application.  To do this, perform the following steps:

  1. Log into the Archer framework and click the Administration workspace tab.

  2. Click Application Builder in the Navigation Menu.

  3. Search for the Applications application and click Applications.

  4. Go to the Layout tab and create the fields listed in the table below. Use the following names for the fields (if the field already exists there is no need to recreate it):

Field Type

Name

Values List

Assurance Level

Values List

Veracode Rating

Date

Generation Date

Text

Grace Period Expired

Date

Planned Deployment Date

Values List

Policy Compliance Status

Text

Policy Name

Text

Tags

Text

Teams

Sub–Form

Modules

  1. Add the fields to the layout in the location desired. You may wish to create a section or tab to house the Veracode-specific fields, but this is an optional step. 

  2. There is also a Cross-Reference field to the Software Security Review application that is automatically created upon installation of the application package. Adding this field, called Software Security Review, to the layout will give a listing of the flaws that pertain to a particular application.

  3. Once the fields have been created, and the application has been saved, import the data feed configuration files, so that the feeds can populate the fields in the appropriate application(s).

Task 4: Importing the Veracode Download – FTP data feed configuration file

After the Python script is configured, configure the Veracode Download – FTP Data Feed to push the XML file into Archer and create the records. To perform the import, do the following:

  1. The Veracode Download – FTP Data Feed will be uploaded into the system during the Veracode_Software_Security_Review_1.2.zip package installation.

  2. Browse to Manage Data Feeds and click on the Veracode Download – FTP Data Feed.

  3. Verify settings on the General Information tab.  Be sure to change the status to Active before using the feed. 

  4. Click Transport, FTP should be the transport type selected.

  5. In the Transport Configuration section on the transport tab, the path should be specified.

  6. Click the Data Map tab to review field mapping and make any necessary changes.  A list of recommended field mappings can be found in Appendix B.

Task 5: Activate and schedule the Veracode download data feed

Specify a schedule for the feed to run.

  1. Browse to Manage Data Feeds and click Veracode Download Data Feed.

  2. Click the Schedule tab, and configure the frequency and start time of the Data Feed:

  3. Click Run Data Feed Now to override the set data feed execution schedule and immediately execute your data feed.

  4. Click Save to apply your configuration to the data feed. Click the Run Detail link for additional information on the status of the feed or to troubleshoot any feed errors.

Using the Veracode integration

The integration of Veracode with Archer enables customers to better manage their organization's risk by proactively identifying, tracking and managing the repair of critical application vulnerabilities. In addition, customers can integrate with other Archer solutions such as Policy Management and IT Security Risk Management to gain a broader understanding of the risks to the organization.

Utilize Archer’s workflow by managing findings and tracking remediations for the exposed vulnerabilities. The Veracode Integration package also comes with reports to help organize scan results in Archer including: “Veracode Scan Results by Severity” and “Top 10 Most Vulnerable Applications”.

Certification environment

Date Tested: September 2020

Product Name

Version Information

Operating System

Archer

6.9

Windows

Veracode

Release 2020.8

n/a

Field mappings

This table contains the field mappings for the Veracode Download data feed (Key fields in bold). Archer target fields that are grayed out are either deprecated or are unused in the integration.

Source Fields

Target Archer Fields

any_scan_due_date

 

app_name

Application Name

app_origin

 

assurance_level

Assurance Level

business_owner

Application Owner

business_unit

Business Units\Business Unit

custom0

 

custom1

 

custom2

 

custom3

 

custom4

 

dynamic_score

 

flaws

Software Security Review (SSR)

flaws\app_name

SSR\Application Name*

flaws\capecid

SSR\Capecid

flaws\categoryid

SSR\Category ID

flaws\categoryname

SSR\Category

flaws\cia_impact

SSR\CIA Impact

flaws\count

SSR\Count

flaws\cwe_description

SSR\CWE Description

flaws\cweid

SSR\CWE ID

flaws\date_first_occurance

SSR\Date First Occurance

flaws\exploit_desc

SSR\Exploit Description

flaws\exploitdifficulty

SSR\Exploit Difficulty

flaws\exploitLevel

SSR\Exploit Level

flaws\flaw_description

SSR\Description

flaws\flaw_issue_id

SSR\Vun ID*

flaws\functionprototype

SSR\Function Prototype

flaws\functionrelativelocation

SSR\Function Relative Location

flaws\is_latest_build

SSR\Is Latest Build

flaws\line

SSR\Line

flaws\mitigation_status

SSR\Mitigation Status

flaws\mitigation_status_desc

SSR\Mitigation Status Description

flaws\mitigations\action

SSR\Mitigations\Action

flaws\mitigations\date

SSR\Mitigations\Date

flaws\mitigations\description

SSR\Mitigations\Description

flaws\mitigations\user

SSR\Mitigations\User

flaws\module

SSR\Module*

flaws\note

SSR\Note

flaws\pcirelated

SSR\PCI Related

flaws\platform

SSR\Platform

flaws\published_date

SSR\Published Date

flaws\remediation_desc

SSR\Remediation Description

flaws\remediation_status

SSR\Remediation Status

flaws\remediationeffort

SSR\Remediation Effort

flaws\scope

SSR\Scope

flaws\severity

SSR\Severity

flaws\severity_desc

SSR\Severity Description

flaws\sourcefile

SSR\Source File

flaws\sourcefilepath

SSR\Source File Path

flaws\type

SSR\Type

flaws\url

SSR\URL

flaws\version

SSR\Application Version*

generation_date

Generation Date

grace_period_expired

Grace Period Expired

last_update_date

 

lifecycle_stage

 

manual_score

 

mitigated_rating

 

modules

Modules Sub Form

modules\analysis_type

Modules\Analysis Type

modules\architecture

Modules\Architecture

modules\compiler

Modules\Compiler

modules\module

Modules\Module

modules\os

Modules\Operating System

planned_deployment_date

Planned Deployment Date

platform

Platform

policy_compliance_status

Policy Compliance Status

policy_name

Policy Name

policy_rules_passed

 

poilcy_version

 

rating

Veracode Rating

scan_overdue

 

static_score

 

submitted_date

 

tags

Tags

teams

Teams

version

Version

Note: Vuln ID, Application Version, Module, and Application Name are all part of a compound key for the Software Security Review application, therefore their Order should all be set to 1 in the Key Field Definitions Tab.*