Scanning Setup Guide
Setting Up AquilaX Scanning and Groups: A Guide
Last updated
Setting Up AquilaX Scanning and Groups: A Guide
Last updated
Organizations often have multiple repositories distributed across platforms like GitHub and GitLab. While some repositories have CI/CD pipelines enabled, others do not. To ensure comprehensive scanning across all repositories—both on event-based triggers and periodically—it’s essential to establish a well-structured setup. This practice is commonly referred to as Application Security Hygiene and is often a mandatory requirement for maintaining software security compliance.
Here’s how to set up your AquilaX environment for optimal scanning and group management:
Log in to the AquilaX portal. Create or modify your groups to maintain a simple structure. For most cases, having a single group—let’s call it “Default Group”—is sufficient. This centralizes management and simplifies your setup.
If there are pre-existing projects in the group, delete them to start fresh. A clean setup ensures consistency and avoids misconfigurations.
Set up a Security Policy JSON for your group. This policy defines the scanning rules and parameters to ensure uniform application across all repositories.
• For each repository in GitHub or GitLab:
• Integrate AquilaX scanning into the CI/CD pipeline to automatically scan code with every software change. https://docs.aquilax.ai/user-manual/devtools/ci-cd
• This ensures that vulnerabilities are identified and addressed in real-time during development.
Regardless of CI/CD-triggered scans, initiate a full scan of all repositories weekly. This practice captures any vulnerabilities that might be missed in incremental scans.
Engage AquilaX’s team to review findings classified as “Unverified”, This step reduces noise by identifying false positives. It also helps train your custom AI model, improving accuracy over time. (Note: This feature is available with the Ultimate License.)
Access the report page to review detailed findings or wait for the automated weekly report over email for a summary of security insights.
If needed, set up a separate group for testing or development purposes. This serves as a sandbox environment for experimentation without impacting production scans.