Configure Connection Details of Security Assessment Tools

Continuous container security and code quality assessment is an integral part of a DevSecOps development environment. A code quality inspection tool helps developers continuously analyze and improve the quality of the source code by identifying bugs, duplications, security vulnerabilities, and code smells. A container security tool scans container images and related components to detect security vulnerabilities and potential security threats.

You can provide the connection details of your code quality inspection and container security tools in the Lazsa Platform and save your configurations. When you add or edit a stage in the Deploy phase of your product development life cycle, you can select these saved configurations in the stage details. Code quality analysis and container security scans are triggered by using these configurations during the deployment process in the Jenkins CI/CD pipeline from within the Lazsa Platform.

The Lazsa Platform currently supports the following security assessment tools:

  • SonarQube

  • Qualys Cloud Platform

To provide the connection details of your active accounts of these security assessment tools in the Lazsa Platform, perform these steps:

  1. Sign in to the Lazsa Platform and click Configuration in the left navigation pane.

  2. On the Platform Setup screen, on the Cloud Platform, Tools & Technologies tile, click Configure.
  3. On the Cloud Platform, Tools & Technologies screen, in the Security Assessment section, click Configure.

    (After you save connection details for at least one security assessment tool, you see the Modify button here.)

    Configure connection details of Security Assessment Tools

  4. On the Security Assessment screen, click the SonarQube tile or the Qualys tile to configure the connection properties of your active accounts for these tools.

    Click CONFIURE to add connection details of SonarQube and Qualys

Related Topics Link IconRelated Topics

What's next? Integrated_Development_Environment