Cloudeka
  • Service Portal Cloudeka
  • Starter Guide Deka Flexi
  • Introduction
    • Sign Up
    • Sign In
    • Sign Out
    • Forgot Password
    • Project
      • Create a New Project
      • List Service
      • Delete Project
    • Profile Setting
    • Organization
      • Manage Role Organization
      • Setting Organization
    • Check Audit Log
    • Broadcast
    • Voucher
      • Voucher Trial
      • Voucher Credit
      • Voucher Discount
  • Deka Flexi
    • Deka Flexi: Instance
      • Introduction
      • Machine Type
      • Operating Systems
      • Server Group
        • Create Server Group
        • Detail Server Group
        • Delete Server Group
      • Create a VM Instance
      • Details Instance
        • Deka Agent
        • Power On Instance
        • Power Off Instance
        • Reboot Instance
        • Resize Instance
        • Resize Root Disk
        • Attach Interface
        • Detach Interface
      • Connect to VM Instance
        • Connect to VM Instance via Cloudeka Portal
        • Connect to Windows VM Instance via RDP (Remote Desktop)
        • Connect to Linux VM Instance via SSH
        • Connect to Linux VM Instance via SSH Key
      • Create SSH Keys
      • Delete VM Instance
    • Deka Volume: Storage
      • Creating & Attaching a Storage or Disk
      • Formatting a Disk
        • Formatting & mounting a disk on Windows
        • Formating & mounting a disk on Linux
      • Increase Storage
      • Delete Storage
    • Deka Volume: Images
      • Snapshot
        • Take a Snapshot for Instance
        • Restore a snapshot for Instance
        • Delete a snapshot for Instance
        • Take a snapshot for Storage
        • Delete a snapshot for Storage
      • Backups
      • Custom Image
    • Deka Flexi: Network
      • VPC Network
        • Create VPC Network
        • Edit VPC Network
        • Add/EditPort
        • Delete Port
        • Add/Edit Subnet
        • Delete Subnet
        • Delete VPC Network
      • Floating IP
        • Assign Floating IP
        • Unassign Floating IP
        • Reassign Floating IP
        • Delete Floating IP
    • Deka Flexi: Security
      • Security Firewall Rule
      • Edit Security Firewall Rule
      • Delete Security Firewall Rule
    • Deka SLB
      • Create Load Balancer
      • Configuration Deka SLB
      • Delete Load Balancer
      • Example Use Case
    • Deka VPN
      • Create VPN
      • OpenVPN Configuration
        • Create OpenVPN
        • Add OpenVPN User
        • Edit OpenVPN User Configuration
        • Download OpenVPN
        • Install OpenVPN on Windows
        • Install OpenVPN on MacOS
        • Connection with OpenVPN
        • Delete OpenVPN User
        • Delete OpenVPN
      • IPsec Configuration
        • Create IPsec
        • Connect IPsec
        • View Pre Shared Key
        • Disconnect IPsec
        • Delete IPsec
      • Remote Instance using Putty
      • Delete VPN
    • NAT Gateway
      • Create NAT Gateway
      • Configuration NAT Gateway
        • Add Floating IP
        • Delete Floating IP
        • Add Static Route
        • Delete Static Route
        • Add NAT
        • Delete NAT
      • Remote Instance
        • Create VPC Expert
        • Create Instance
        • Floating IP Configuration
        • Virtual Machine Access Internet
        • Remote Virtual Machine using Computer Terminal
      • Remote Putty
        • Create VPC
        • Configuration Interface
        • Configuration NAT Gateway
        • Configuration Firewall
        • Remote Instance using Putty
      • Delete NAT Gateway
    • Deka Agent
      • Install Deka Agent on Linux
      • Detail Deka Agent
        • Quick CPU / Mem / Disk
        • Basic CPU/ Mem/ NET/ Disk
        • Memory Meminfo
        • Memory Vmstat
        • System Timesync
        • System Processes
        • System Misc
        • Hardware Misc
        • Systemd
        • Storage Disk
        • Storage Filesystem
        • Network Traffic
        • Network Sockstat
        • Network Netstat
        • Node Exporter
      • Export to PDF
      • Monitoring Deka Agent
    • Deka GLB
      • Create Deka GLB
      • Configuration Deka GLB
      • Delete Deka GLB
      • Example Use Case
  • Deka Prime
    • Introduction
    • NSX-T & NSX-V
    • Delete Project
    • Menu Instance
      • Create New Instance
      • Access Console Instance
      • Power On Instance
      • Power Off Instance
      • Detail Instance
      • Configuration NICs
      • Configuration Guest OS
    • Menu Network
      • Create Routed Network
      • Create Isolated Network
      • Edit Network
      • Delete Network
    • Menu Security
      • Firewall
      • NAT
      • Routing
      • IP Set
    • Menu Catalog
    • Configuration Deka Flexi
  • Storage
    • Deka Box
      • Create Deka Box
      • Overview Deka Box
      • Resize Deka Box
      • Managing Deka Box Access Key
      • Access Deka Box using S3 Browser
      • Upload files and folders in S3
      • Enable versioning in S3
      • Create Static Web in S3
      • Delete Deka Box
      • Bucket and Group Access Policies
        • Specify permissions
        • Edit S3 Bucket Policies
    • Deka NFS
      • Create Deka NFS
      • Detail Deka NFS
      • Mount Deka NFS in Instance
      • Unmount Deka NFS in Instance
      • Delete Deka NFS
  • Network
    • Deka CDN
      • Create CDN
      • Location Configuration CDN
      • Configuration CDN via Editor
      • Deploy CDN
      • Renewal SSL
      • Delete CDN
    • Deka DNS
      • Create DNS
      • Setting DNS Management
      • Delete DNS
  • Platform
    • Deka Dbaas
      • Create Data Store
      • Data Store Detail
      • Delete Data Store
      • Database Access Using Other Apps
    • Deka Rock
      • Create Deka ROCK
      • Detail Deka ROCK
      • Machine Set
      • Security Group
      • Maintenance Windows
      • Open Console with Openshift
      • Installing CLI (oc) on Computer
      • Destroy Cluster Deka ROCK
    • Deka Harbor
      • Create Deka Harbor
      • Detail Deka Harbor
      • Configuration Worker
      • Configuration Load Balancer
      • Configuration Inbound Rule
      • Kubernetes Dashboard
      • Delete Deka Harbor
  • Security
    • Deka AST
      • Create Project
      • Scan Project
      • Change Setting Project
      • SAST
      • SAST Issue
      • SAST: Measure Code
      • SAST: Custom Rule
      • SAST: Security Detector
      • SCA
      • Secret Key
      • Repo Missconfiguration
      • Scan Validation AppSec
      • Dynamic Security
      • Integration
      • Report
      • Delete Project
    • Deka SSL
      • Create Deka SSL
      • Download Key SSL
      • Renewal SSL
      • Import SSL
      • Delete SSL
  • CI/CD
    • Deka Registry
      • Create Deka Registry
      • Summary
      • Repositories
      • Logs
      • Labels
      • Tag
      • Member
      • Push
      • Resize
      • Delete Deka Registry
  • Software
    • Deka POP
      • Introduction
      • Detail Deka Pop
  • Monitoring
    • Alerting
      • Create Alert
      • Edit Alert
      • Delete Alert
      • Alerting Tes Implementation
    • Deka Agent
  • Support
    • Support Ticketing
      • Create Ticket
      • Ticket Details
    • Deka Manage Service
      • Bought a Manage Service Package
      • Downgrage/Upgrade Package
      • Unsubscribe Package
  • Billing
    • Check Billing
    • Balance
      • Billing Payment type Postpaid Project
      • Billing Payment type Prepaid Project
  • Miscellaneous
    • NTP Server
    • How to Sync Local and Remote Directories with Rsync
  • Deka GPU
Powered by GitBook
On this page
  • SCA: Result Vulnerability
  • SCA: Filter Scan Vulnerability
  1. Security
  2. Deka AST

SCA

PreviousSAST: Security DetectorNextSecret Key

Last updated 2 months ago

Software Composition Analysis (SCA) is the process of identifying and managing third party open source components included in software applications. SCA aims to assist in identifying and fixing security vulnerabilities at the software component level.

SCA: Result Vulnerability

To ensure the security of your repository code, it is important to display all vulnerabilities present in your project. You can identify software components that have known vulnerabilities and take appropriate action to implement the required mitigation steps. Through this menu, you can increase security and ensure that the repository code is protected from attacks that can exploit existing vulnerabilities. In Result Vulnerability displays three dashboards: SCA Repository Status is the scan status of the repository code, Project Health is the health quality of the repository code, and Repository Vulnerability Found is the number of vulnerabilities found in the repository code.

Result Vulnerability - Dashboard

The Issues tab in Result Vulnerability displays a list of vulnerabilities in the repository code that you have. This list identifies potential vulnerabilities in repository code, such as hacking vulnerabilities, network vulnerabilities, and other things. So that you can take appropriate action to fix and improve the security of the repository code to protect the system from attacks and ensure integrity and security.

On the History tab of the Result Vulnerability is a history of changes associated with vulnerabilities that are identified in your repository code. The history tab is classified as three of which New Vulnerability is a new vulnerability found when successfully scanned, Fixed Vulnerability is a fixed vulnerability, and Rediscovered Vulnerability is a vulnerability recovered when the scan is repeated. To view details of the new vulnerabilities found during the scan click See more Details to view the severity and explain why this could be a problem.

SCA: Filter Scan Vulnerability

On the Scan Vulnerability Filter menu, there are three dashboards: Unfixed Vulnerabilities to detect uncorrected vulnerabilities, user Severity can select a severity level to display on the Result Vulnerability page, and the user ID Ignore Vulnerability ID can ignore the vulnerability by adding a new vulnerability ID.

Result Vulnerability - Issue
Result Vulnerability - History
Result Vulnerability - History - Vulnerability Detail
Filter Scan Vulnerability
Page cover image