Fortifyπ£
Overviewπ£
Micro Focus Fortify Software Security Center(SSC) or simply “Fortify“, is a centralized management and analysis facility for application data gathered and processed using Fortify analysis products and tools(Fortify Static Code Analyzer, Fortify WebInspect, and Audit WorkBench, etc), providing visibility to an organization’s entire application security program to help resolve security vulnerabilities across the software portfolio. It is a platform where users can review, audit, prioritize, and manage remediation efforts, track software security testing activities, and measure improvements via the management dashboard and reports to optimize static and dynamic application security test results. Fortify SSC helps to provide an accurate picture and scope of the application security posture across the enterprises.
Architectureπ£
The following table provides descriptions of the required and optional Fortify Software Security Center installation components in the illustration. | Component | Description | | — | — | | Fortify SSC Server | Fortify Software Security Center is delivered as a Web Archive (WAR) file run by Tomcat Server or as a Helm chart for Kubernetes deployment. | | SSC database |Thirdβparty database that Fortify Software Security Center requires to store user and artifact data. Before you put Fortify Software Security Center into production, you must install a supported thirdβparty database. | | Thirdβparty LDAP authentication server | (Optional) You can configure Fortify Software Security Center to use LDAP authentication. | | Defectβtracking server |(Optional) You can configure Fortify Software Security Center to enable bug submission directly to Bugzilla, Jira, ALM, Azure DevOps Server, or a customized bugβtracking system. For information about how to create a customized bug-tracking system, see Authoring Bug Tracker Plugins. | | Thirdβparty email server |(Optional) You can configure Fortify Software Security Center to use an external SMTP email server to send alerts to application collaborators. | | Fortify Static Code Analyzer analysis agent |(Optional) Fortify Static Code Analyzer scans source code and identifies issues. | | Audit Workbench and IDE plugins |Audit Workbench and Fortify IDE plugins can be used as alternative sourceβcode auditing tools. | | Jenkins\ Azure DevOps\ Bamboo |Use these plugins to scan source code (using Fortify Static Code Analyzer) and upload scan results. | | Fortify ScanCentral SAST |(Optional) Fortify Static Code Analyzer users can use ScanCentral SAST to offload processor-intensive code analysis tasks from their build machines to a group of machines (sensors) provided for this purpose. | | Fortify ScanCentral DAST |(Optional) A dynamic application security testing tool that you can use to configure and run dynamic scans of your web applications from Fortify Software Security Center. | | Fortify WebInspect |(Optional) Analysis agent that connects with Fortify WebInspect agents to retrieve potential dynamic issues. | | Fortify Security Content update server |Used to acquire and update Security Content. | Important! Fortify does not support load balancing across multiple Fortify Software Security Center servers.
Big Bang Touchpointsπ£
KyvernoPoliciesπ£
When deploying to k3d, the validationFailureAction
for the restrict-host-path-mount-pv
policy should be set to audit
. This can be done by modifying chart/values.yaml
file or passing an override file with the values set as seen below. This is for development purposes only: production should use the default setting of enforce
.
kyvernoPolicies:
values:
policies:
restrict-host-path-mount-pv:
validationFailureAction: audit
Licensingπ£
By default, Big Bang will deploy Fortify without a license. if you have a license, you can add your license via the values file as shown below:
addons:
fortify:
fortify_license: |
<license>