METHODS AND SYSTEMS FOR MULTI-TOOL ORCHESTRATION
First Claim
1. A system for performing code security scan, comprising:
- one or more processors;
a graphical user interface (GUI); and
memory storing instructions that, when executed by the one or more processors, cause the one or more processors to;
receive code to be scanned;
analyze the code to be scanned with two or more software security analysis tools, each of the two or more software security analysis tools selected from a different category, the different category being selected from one or more of;
a first software security analysis tool of a first category for performing Static Application Security Testing (SAST),a second software security analysis tool of a second category for performing Dynamic Application Security Testing (DAST), anda third software security analysis tool of a third category for performing Open Source Analysis (OSA);
display, in the GUI, status information of the analysis from each of the two or more software security analysis tools, the status information comprising a selectable button to configure each of the two or more software security analysis tools;
receive a result from each of the two or more software security analysis tools;
aggregate the result from each of the two or more software security analysis tools; and
display, on the GUI, (i) the aggregation from each of the two or more software security analysis tools, and (ii) a confidence score for each of the two or more software security analysis tools.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for performing code security scan includes a non-transitory computer readable medium and a processor. The non-transitory computer readable medium stores a plurality of identifiers each identifying a software security analysis tool of one of several categories, including SAST, DAST and OSA tools. The processor receives an identification of code to be scanned. The processor selects at least two identifiers from the plurality of identifiers. The at least two identifiers identify at least two select software security analysis tools for execution on the identified code. The processor receives an execution result from each select software security analysis tool after performing execution on the identified code. The processor aggregates the execution result from each select software security analysis tool. A user interface displays an aggregation of the execution result from each select software security analysis tool.
-
Citations
20 Claims
-
1. A system for performing code security scan, comprising:
-
one or more processors; a graphical user interface (GUI); and memory storing instructions that, when executed by the one or more processors, cause the one or more processors to; receive code to be scanned; analyze the code to be scanned with two or more software security analysis tools, each of the two or more software security analysis tools selected from a different category, the different category being selected from one or more of; a first software security analysis tool of a first category for performing Static Application Security Testing (SAST), a second software security analysis tool of a second category for performing Dynamic Application Security Testing (DAST), and a third software security analysis tool of a third category for performing Open Source Analysis (OSA); display, in the GUI, status information of the analysis from each of the two or more software security analysis tools, the status information comprising a selectable button to configure each of the two or more software security analysis tools; receive a result from each of the two or more software security analysis tools; aggregate the result from each of the two or more software security analysis tools; and display, on the GUI, (i) the aggregation from each of the two or more software security analysis tools, and (ii) a confidence score for each of the two or more software security analysis tools. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A multi-tool orchestration system comprising:
-
one or more processors; a graphical user interface (GUI); and memory storing instructions that, when executed by the one or more processors, cause the one or more processors to; receive, from a host server, an analysis request comprising software code to be scanned and two or more software security analysis tools to perform the scan, each of the two or more software security analysis tools selected from a different category, the different category being selected from one or more of; a first software security analysis tool of a first category for performing Static Application Security Testing (SAST), a second software security analysis tool of a second category for performing Dynamic Application Security Testing (DAST), and a third software security analysis tool of a third category for performing Open Source Analysis (OSA); analyze, with the two or more software security analysis tools, the software code; display, on the GUI, status information of the analysis from each of the two or more software security analysis tools, the status information comprising a selectable button to configure each of the two or more software security analysis tools; aggregate the analysis from each of the two or more software security analysis tools to create an aggregate result; provide, to the host server, the aggregate result for a presentation on a multi-tool security analysis website; display, on the GUI, (i) the aggregate result and (ii) a confidence score for each of the two or more software security analysis tools; receive, from the GUI, an indication of at least one false positive result in the aggregate result; and instruct an additional software security analysis tool from each category to perform an additional security scan on the software code. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A multi-tool security analysis system comprising:
-
one or more processors; a graphical user interface (GUI); and memory storing instructions that, when executed by the one or more processors, cause the one or more processors to; receive an analysis request comprising software code to be scanned and two or more software security analysis tools, each of the two or more software security analysis tools being selected from different categories, the different categories being selected from one or more of; a first software security analysis tool of a first category for performing Static Application Security Testing (SAST), a second software security analysis tool of a second category for performing Dynamic Application Security Testing (DAST), and a third software security analysis tool of a third category for performing Open Source Analysis (OSA); analyze, with the two or more software security analysis tools, the software code; display, in the GUI, status information of the analysis from each of the two or more software security analysis tools, the status information comprising a selectable button to configure each of the two or more software security analysis tools; receive, from the GUI, user configuration settings corresponding to at least one of the two or more software security analysis tools; configure the at least one of the two or more software security analysis tools based on the user configuration settings; aggregate a vendor-specific output from each of the two or more software security analysis tools to create an aggregate result; send the aggregate result to a multi-tool security analysis website for presentation; display, on the GUI, (i) the aggregate result and (ii) a confidence score for each of the two or more software security analysis tools; receive, from the GUI, an indication of at least one false positive result in the aggregate result; and instruct an additional software security analysis tool from each category to perform an additional security scan on the software code. - View Dependent Claims (19, 20)
-
Specification