Configure the Veracode Vulnerability Integration
- UpdatedAug 1, 2024
- 4 minutes to read
- Xanadu
- Application Vulnerability Response
Before you run the integration on your instance, the installation and configuration steps must be completed so the Veracode product properly integrates with Application Vulnerability Response. This application is available as a separate subscription.
Before you begin
| Setup tasks | Description |
|---|---|
| Verify that the Vulnerability Response application is installed and activated. | To verify that this application is activated, navigate to in your instance. The list displays the subscriptions your organization has purchased. If the application is not installed and activated see, Install Vulnerability Response. |
| Verify that the Vulnerability Response Integration with Veracode application is installed and activated. | To verify that this application is activated, navigate to in your instance. The list displays the subscriptions your organization has purchased. If the application is not installed and activated see, Install the ServiceNow Vulnerability Response Integration with Veracode. |
| Verify that you have the required ServiceNow roles for your instance. | The following roles are required for configuration, and verification of expected results:
|
For the Veracode Application Vulnerability integration, have your API id and API key ready. |
Contact Veracode to obtain theAPI id and API key. See Preparing for the Veracode Vulnerability Integration. Starting with version 4.0, if you are using the Veracode Vulnerability Integration, the penetration assessment tests in the Veracode Vulnerability Integration are manual findings from Veracode. These findings are not linked to any penetration test assessment requests you configure in Application Vulnerability Response. For more information about penetration test requests in Application Vulnerability Response, see Configure penetration testing. |
Procedure
What to do next
On initial installation, refer to Configure Application Vulnerability Response for further instructions.
After initial installation, for modifications refer to Veracode Vulnerability Integration modifications and activities.