...
Title | Enter a new title to replace the default title that appears on the dashboard. |
---|---|
Filter | Choose a specific filter or Dashboard Settings from the menu. See Configuring Filters for additional information. |
Target Build | Choose a specific build from the menu. The build selected for the entire dashboard is selected by default. See Using Build Administration for additional information about understanding builds. |
Compliance Profile | Specify a compliance profile (see Custom Configuration for Profile Configuration). The compliance profile data is used in compliance reports. |
Exploitability | For API Security only. Choose an exploitability category (1 - 3) that you want to view. Refer to the OWASP guidelines for details. Only applies to the OWASP Compliance - Weakness by Status widget. |
Prevalence | For API Security only. Choose a prevalence category (1 - 3) that you want to view. Refer to the OWASP guidelines for details. Only applies to the OWASP Compliance - Weakness by Status widget. |
Detectability | For API Security only. Choose a detectability category (1 - 3) that you want to view. Refer to the OWASP guidelines for details. Only applies to the OWASP Compliance - Weakness by Status widget. |
Impact | For API Security only. Choose an impact level (1 - 3) that you want to view. Refer to the OWASP guidelines for details. Only applies to the OWASP Compliance - Weakness by Status widget. |
...
This widget shows the violations grouped by weakness in a tree map. Each tile is assigned a color and represents a weakness from the OWASP guidelines. See Configuring Security Compliance Pack Widgets for details on how to configure this widget.
AnchorViewing the OWASP Compliance Report Viewing the OWASP Compliance Report
Viewing the OWASP Compliance Report
Viewing the OWASP Compliance Report | |
Viewing the OWASP Compliance Report |
...
The Weakness Detection Plan shows which static analysis rules are used to enforce the OWASP guidelines and is intended to describe how you are enforcing each guideline. This report uses the data specified in the compliance profile (see Custom Configuration for Profile Configuration). In the profile, you can configure the values associated with each weakness property to better reflect the specific challenges associated with your project.
...