Resources
Resources

Configuring Test Tools

After choosing the tools, you will need to configure the parameters of how the test tools are going to execute.

Find out more

Configuring a Connection

There are 2 main ways Uleska interacts with security test tools: 1. Starts test tools inside containers with Kubernetes infrastructure, and runs them...

Find out more

Running a Toolkit

When you have your test toolkit set up and configured for the pipeline you wish to check for, you can then kick off your test tools to assess...

Find out more

Vulnerability Management

Security vulnerabilities can be viewed through our APIs, which allows information to go back to CI/CD systems or other portals, or they can be viewed...

Find out more

Marking Vulnerabilities as Invalid/Valid

Marking Vulnerabilities as Invalid When triaging security issues within a DevSecOps system, you might want to set a vulnerability as a False...

Find out more

Modifying Vulnerabilities/Issues

To modify a vulnerability, click on the Edit button.

Find out more

Setting ASVS or CVSS

What are ASVS and CVSS?

Find out more

Setting Advisories for Recommended Fixes

  After an Application has been tested, the Uleska platform will produce results, including a Recommendation of how to fix the vulnerability, which...

Find out more

Adding Manual Vulnerabilities/Issues

  In addition to Uleska automatically discovering vulnerabilities during the CI/CD pipeline, you are also able to manually add in vulnerabilities...

Find out more

Connecting to CI/CD

To integrate the security testing into a CI/CD pipeline, you can use our Command Line Interface (CLI),  or out API to be able to kick off testing and...

Find out more
2 3 4 5 6