{"id":42387,"date":"2024-01-16T11:48:00","date_gmt":"2024-01-16T11:48:00","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=42387"},"modified":"2024-01-16T11:48:03","modified_gmt":"2024-01-16T11:48:03","slug":"what-is-micro-focus-fortify-and-use-cases-of-micro-focus-fortify","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/what-is-micro-focus-fortify-and-use-cases-of-micro-focus-fortify\/","title":{"rendered":"What is Micro Focus Fortify and use cases of Micro Focus Fortify?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is Micro Focus Fortify?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"403\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-146.png\" alt=\"\" class=\"wp-image-42400\" style=\"width:649px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-146.png 800w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-146-300x151.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-146-768x387.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption class=\"wp-element-caption\"><strong><em>What is Micro Focus Fortify<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>Micro Focus Fortify is a comprehensive <strong>application security (AppSec)<\/strong> platform that helps organizations identify and remediate vulnerabilities throughout the software development lifecycle (SDLC). It acts as a powerful security shield, offering a diverse range of tools and services to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Prevent vulnerabilities:<\/strong> Catch security flaws early in the development process through static and dynamic analysis.<\/li>\n\n\n\n<li><strong>Protect applications:<\/strong> Monitor applications in real-time and actively defend against cyberattacks and exploits.<\/li>\n\n\n\n<li><strong>Manage risk:<\/strong> Prioritize vulnerabilities based on severity and exploitability, optimizing remediation efforts.<\/li>\n\n\n\n<li><strong>Comply with regulations:<\/strong> Demonstrate adherence to industry security standards and data privacy regulations.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Top 10 use cases of Micro Focus Fortify?<\/h2>\n\n\n\n<p>Top 10 Use Cases of Micro Focus Fortify:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Static Application Security Testing (SAST):<\/strong> Analyzes source code for vulnerabilities like SQL injection, cross-site scripting, and insecure coding practices, preventing them from manifesting later.<\/li>\n\n\n\n<li><strong>Dynamic Application Security Testing (DAST):<\/strong> Simulates real-world attacks on running applications to uncover hidden vulnerabilities in web applications and APIs.<\/li>\n\n\n\n<li><strong>Interactive Application Security Testing (IAST):<\/strong> Monitors deployed applications for real-time suspicious activity and attack attempts, providing immediate insight into potential threats.<\/li>\n\n\n\n<li><strong>Runtime Application Self-Protection (RASP):<\/strong> Embeds security controls directly within applications for real-time threat detection and automatic mitigation, acting as an internal security guard.<\/li>\n\n\n\n<li><strong>Software Composition Analysis (SCA):<\/strong> Identifies and manages security risks within open-source and third-party software dependencies, ensuring your applications are built on a secure foundation.<\/li>\n\n\n\n<li><strong>Compliance Management:<\/strong> Simplifies compliance with industry regulations like PCI DSS, HIPAA, and GDPR by providing tools and reports that demonstrate your security posture.<\/li>\n\n\n\n<li><strong>DevSecOps Integration:<\/strong> Seamlessly integrates with development workflows and CI\/CD pipelines to weave security testing throughout the SDLC, promoting continuous security practices.<\/li>\n\n\n\n<li><strong>Vulnerability Management:<\/strong> Provides centralized tracking and prioritization of vulnerabilities, streamlining remediation efforts and ensuring timely fixes.<\/li>\n\n\n\n<li><strong>Security Education and Training:<\/strong> Equips developers and security teams with the knowledge and best practices to build secure applications and address security challenges effectively.<\/li>\n\n\n\n<li><strong>Threat Intelligence:<\/strong> Leverages the latest threat intelligence to stay ahead of evolving cyberattacks and prioritize vulnerabilities based on their relevance to current threats.<\/li>\n<\/ol>\n\n\n\n<p><strong>Micro Focus Fortify offers a comprehensive and adaptable solution for organizations of all sizes to build and maintain secure applications.<\/strong> If you&#8217;re looking to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reduce your attack surface<\/li>\n\n\n\n<li>Minimize security risks<\/li>\n\n\n\n<li>Build trusted and reliable applications<\/li>\n\n\n\n<li>Comply with data privacy regulations<\/li>\n<\/ul>\n\n\n\n<p>Micro Focus Fortify can be a valuable partner in your AppSec journey.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the feature of Micro Focus Fortify?<\/h2>\n\n\n\n<p>Micro Focus Fortify boasts a diverse and powerful set of features designed to comprehensively address your application security needs across the SDLC. Here&#8217;s a closer look at some key highlights:<\/p>\n\n\n\n<p><strong>Vulnerability Detection and Analysis:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SAST (Static Application Security Testing):<\/strong> Scans source code for vulnerabilities like SQL injection, cross-site scripting, and insecure coding practices, helping prevent them early on.<\/li>\n\n\n\n<li><strong>DAST (Dynamic Application Security Testing):<\/strong> Simulates real-world attacks on running applications to uncover hidden vulnerabilities in web apps and APIs.<\/li>\n\n\n\n<li><strong>IAST (Interactive Application Security Testing):<\/strong> Monitors deployed applications for suspicious activity and attack attempts in real-time, providing immediate insights into potential threats.<\/li>\n\n\n\n<li><strong>RASP (Runtime Application Self-Protection):<\/strong> Embeds security controls within applications for real-time threat detection and automatic mitigation, acting as an internal security guard.<\/li>\n\n\n\n<li><strong>SCA (Software Composition Analysis):<\/strong> Identifies and manages security risks within open-source and third-party software dependencies, ensuring secure foundations for your applications.<\/li>\n<\/ul>\n\n\n\n<p><strong>Vulnerability Management and Prioritization:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Centralized Vulnerability Tracking:<\/strong> Provides a single pane of glass to track all identified vulnerabilities across your applications.<\/li>\n\n\n\n<li><strong>Vulnerability Prioritization:<\/strong> Analyzes vulnerabilities based on severity, exploitability, and business impact, helping you focus on the most critical issues first.<\/li>\n\n\n\n<li><strong>Remediation Guidance:<\/strong> Offers clear and actionable steps for fixing vulnerabilities, with detailed reports and resources to empower developers.<\/li>\n<\/ul>\n\n\n\n<p><strong>DevSecOps Integration and Automation:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Seamless Integration with Development Tools:<\/strong> Plugs into popular IDEs, CI\/CD pipelines, and DevOps workflows, making security testing an integral part of the development process.<\/li>\n\n\n\n<li><strong>Automated Scanning and Reporting:<\/strong> Schedules automated scans, generates reports, and tracks progress, streamlining security practices and minimizing manual effort.<\/li>\n<\/ul>\n\n\n\n<p><strong>Compliance and Reporting:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Compliance Management:<\/strong> Simplifies adherence to industry regulations like PCI DSS, HIPAA, and GDPR by providing tools and reports that demonstrate your security posture.<\/li>\n\n\n\n<li><strong>Customizable Dashboards and Reports:<\/strong> Create custom dashboards and reports to visualize security data in a way that suits your specific needs and provides stakeholders with clear insights.<\/li>\n<\/ul>\n\n\n\n<p><strong>Additional Features:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Threat Intelligence:<\/strong> Leverages the latest threat intelligence to stay ahead of evolving cyberattacks and prioritize vulnerabilities based on their relevance to current threats.<\/li>\n\n\n\n<li><strong>Security Education and Training:<\/strong> Equips developers and security teams with the knowledge and best practices to build secure applications and address security challenges effectively.<\/li>\n\n\n\n<li><strong>Scalability and Flexibility:<\/strong> Adapts to diverse application types and development environments, catering to organizations of all sizes.<\/li>\n<\/ul>\n\n\n\n<p>Micro Focus Fortify offers a potent combination of features to meet your AppSec needs. Whether you&#8217;re a developer, security professional, or business leader, Fortify can empower you to build and maintain secure applications with confidence.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Micro Focus Fortify works and Architecture?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"505\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-148-1024x505.png\" alt=\"\" class=\"wp-image-42402\" style=\"width:710px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-148-1024x505.png 1024w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-148-300x148.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-148-768x379.png 768w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-148-1536x758.png 1536w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-148.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Micro Focus Fortify works and Architecture<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>Micro Focus Fortify boasts a complex yet well-designed architecture aimed at providing comprehensive application security across the SDLC. Here&#8217;s a breakdown of its key elements and processes:<\/p>\n\n\n\n<p><strong>Components:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Fortify Platform:<\/strong> The central hub that orchestrates all security analyses, stores data, and manages workflows. It includes:\n<ul class=\"wp-block-list\">\n<li><strong>Scanners:<\/strong> Engines for different analysis types like SAST, DAST, IAST, and SCA.<\/li>\n\n\n\n<li><strong>Database:<\/strong> Stores information about applications, vulnerabilities, and analysis results.<\/li>\n\n\n\n<li><strong>Workflow Engine:<\/strong> Automates tasks like scan scheduling, reporting, and vulnerability tracking.<\/li>\n\n\n\n<li><strong>User Interface:<\/strong> Provides access to tools, reports, and security insights.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Integrations:<\/strong> Fortify seamlessly connects with various development tools and platforms like IDEs, CI\/CD pipelines, and issue trackers.<\/li>\n\n\n\n<li><strong>Applications:<\/strong> Organizations upload their software code, web applications, or third-party dependencies for analysis.<\/li>\n\n\n\n<li><strong>Analysis Tools:<\/strong> Different tools handle specific tasks:\n<ul class=\"wp-block-list\">\n<li><strong>SAST:<\/strong> Scans source code for vulnerabilities in various programming languages.<\/li>\n\n\n\n<li><strong>DAST:<\/strong> Simulates attacks against running applications to detect exploitable weaknesses.<\/li>\n\n\n\n<li><strong>IAST:<\/strong> Monitors application behavior during testing and in deployment to identify suspicious activity.<\/li>\n\n\n\n<li><strong>RASP:<\/strong> Embeds security controls within applications for real-time threat detection and mitigation.<\/li>\n\n\n\n<li><strong>SCA:<\/strong> Analyzes dependencies for known vulnerabilities and license compliance issues.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Vulnerability Management:<\/strong> After analysis, vulnerabilities are identified and classified based on severity and risk. Fortify offers features like:\n<ul class=\"wp-block-list\">\n<li><strong>Prioritization:<\/strong> Ranking vulnerabilities based on potential impact and exploitability.<\/li>\n\n\n\n<li><strong>Remediation guidance:<\/strong> Providing developers with clear steps to fix vulnerabilities.<\/li>\n\n\n\n<li><strong>Tracking and reporting:<\/strong> Monitoring progress towards resolving vulnerabilities.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>Architecture Benefits:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Centralized platform:<\/strong> Streamlines security management and provides a single source of truth for all security data.<\/li>\n\n\n\n<li><strong>Integrated solution:<\/strong> Seamlessly connects with developer workflows for efficient and continuous security testing.<\/li>\n\n\n\n<li><strong>Automated processes:<\/strong> Automates scans, reporting, and remediation tasks for faster execution and reduced manual effort.<\/li>\n\n\n\n<li><strong>Flexibility and scalability:<\/strong> Adapts to various application types and security needs, catering to organizations of all sizes.<\/li>\n\n\n\n<li><strong>Comprehensive analysis:<\/strong> Combines multiple analysis methods for a holistic view of application security risks.<\/li>\n<\/ul>\n\n\n\n<p>In essence, Fortify&#8217;s architecture empowers organizations to implement a proactive and efficient approach to application security throughout the software lifecycle.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Install Micro Focus Fortify it?<\/h2>\n\n\n\n<p>Installing Micro Focus Fortify directly isn&#8217;t the typical approach, as it&#8217;s a cloud-based platform delivered as a service. There are several ways to access and utilize Fortify depending on your specific needs:<\/p>\n\n\n\n<p><strong>1. Free Trial:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Visit the Veracode official website and click on &#8220;Free Trial.&#8221;<\/li>\n\n\n\n<li>This provides you access to a limited range of Fortify features and a trial period to search its capabilities.<\/li>\n\n\n\n<li>Ideal for beginners or organizations evaluating Fortify for the first time.<\/li>\n<\/ul>\n\n\n\n<p><strong>2. Subscription Purchase:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Contact Micro Focus sales or an authorized partner to purchase a subscription plan based on your specific needs.<\/li>\n\n\n\n<li>Different plans offer varying features, scan limits, and support options.<\/li>\n\n\n\n<li>This approach is suitable for organizations requiring advanced functionalities and ongoing security assessment.<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Integration with Veracode Platform:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If you already use the Veracode platform for other AppSec services, you can integrate Fortify features within the same platform.<\/li>\n\n\n\n<li>This provides a unified view of all application security assessments and simplifies workflow management.<\/li>\n\n\n\n<li>You may need to purchase additional Fortify modules or subscriptions depending on the desired features.<\/li>\n<\/ul>\n\n\n\n<p><strong>4. On-Premise Deployment (Advanced Users):<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In specific cases, Micro Focus offers an on-premise deployment option for organizations with strict security requirements or network limitations.<\/li>\n\n\n\n<li>This setup requires installing and maintaining Fortify software on your own infrastructure.<\/li>\n\n\n\n<li>This option is generally recommended for experienced users with dedicated IT resources.<\/li>\n<\/ul>\n\n\n\n<p>Here are some additional points to consider:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>System Requirements:<\/strong> Ensure your environment meets the minimum system requirements for the chosen access method.<\/li>\n\n\n\n<li><strong>Integration Configuration:<\/strong> If integrating with other tools, follow the specific instructions provided by Micro Focus.<\/li>\n\n\n\n<li><strong>User Accounts and Permissions:<\/strong> Create user accounts and assign appropriate permissions within the platform.<\/li>\n\n\n\n<li><strong>Training and Support:<\/strong> Utilize available training resources and support channels to learn best practices and address any technical challenges.<\/li>\n<\/ul>\n\n\n\n<p>Remember, the best approach to installing Fortify depends on your specific needs and environment. I recommend exploring the available options and seeking guidance from Micro Focus or its partners to ensure a smooth and successful installation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Basic Tutorials of Micro Focus Fortify: Getting Started<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-149-1024x576.png\" alt=\"\" class=\"wp-image-42403\" style=\"width:716px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-149-1024x576.png 1024w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-149-300x169.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-149-768x432.png 768w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-149-1536x864.png 1536w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-149-355x199.png 355w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-149.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Basic Tutorials of Micro Focus Fortify<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>To craft the most helpful tutorials, let&#8217;s explore your preferred area of focus within Micro Focus Fortify:<\/p>\n\n\n\n<p><strong>1. Static Code Analysis (SCA):<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Basic DAST Scan:<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>Step 1:<\/strong> Download and install the Fortify Static Code Analyzer (SCA) on your development machine.<\/li>\n\n\n\n<li><strong>Step 2:<\/strong> Open the SCA and create a new project for your codebase.<\/li>\n\n\n\n<li><strong>Step 3:<\/strong> Import your source code files (supported languages vary depending on your SCA license).<\/li>\n\n\n\n<li><strong>Step 4:<\/strong> Run a Quick Scan or choose a specific configuration depending on your needs.<\/li>\n\n\n\n<li><strong>Step 5:<\/strong> Review the identified vulnerabilities, their severity, and suggested remediation steps.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Building a Custom Scan Profile:<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>Step 1:<\/strong> In the SCA, navigate to &#8220;Analysis Profiles&#8221; and create a new profile.<\/li>\n\n\n\n<li><strong>Step 2:<\/strong> Configure the scanning options, including targeted files\/folders, rule sets, and severity thresholds.<\/li>\n\n\n\n<li><strong>Step 3:<\/strong> Save the profile and use it for subsequent scans tailored to your specific needs.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>2. Dynamic Application Security Testing (DAST):<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Simulating Real-World Attacks:<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>Step 1:<\/strong> Install the Fortify WebInspect Scanner on your machine or deploy it on a server.<\/li>\n\n\n\n<li><strong>Step 2:<\/strong> Configure your application target (URL, credentials, authentication methods).<\/li>\n\n\n\n<li><strong>Step 3:<\/strong> Choose a scanning profile or customize settings to focus on specific vulnerabilities.<\/li>\n\n\n\n<li><strong>Step 4:<\/strong> Run the scan and observe the spidering process as WebInspect crawls your application.<\/li>\n\n\n\n<li><strong>Step 5:<\/strong> Analyze the identified vulnerabilities, exploit attempts, and recommendations for mitigation.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Integration with CI\/CD Pipeline:<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>Step 1:<\/strong> Choose your CI\/CD platform (Jenkins, GitLab CI, etc.) and install the Fortify WebInspect plugin.<\/li>\n\n\n\n<li><strong>Step 2:<\/strong> Configure the plugin to automatically trigger scans at key stages of your pipeline (build, deploy).<\/li>\n\n\n\n<li><strong>Step 3:<\/strong> Set fail conditions based on critical vulnerability findings to prevent insecure deployments.<\/li>\n\n\n\n<li><strong>Step 4:<\/strong> Integrate vulnerability reports and remediation progress into your development workflow.<\/li>\n\n\n\n<li><strong>Step 5:<\/strong> Collaborate and iterate to embed security testing as a core practice within your CI\/CD process.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Vulnerability Management:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Prioritizing Vulnerabilities:<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>Step 1:<\/strong> Open the Fortify Audit Workbench and navigate to the &#8220;Vulnerability Management&#8221; section.<\/li>\n\n\n\n<li><strong>Step 2:<\/strong> Filter vulnerabilities by application, severity, exploitability, and other relevant criteria.<\/li>\n\n\n\n<li><strong>Step 3:<\/strong> Analyze the CVSS score, exploit details, and potential impact of each vulnerability.<\/li>\n\n\n\n<li><strong>Step 4:<\/strong> Assign vulnerabilities to development teams and prioritize them based on risk and resource availability.<\/li>\n\n\n\n<li><strong>Step 5:<\/strong> Track progress towards fixing vulnerabilities with reports and status updates.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Remediation Workflow:<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>Step 1:<\/strong> Select a prioritized vulnerability and review the detailed remediation guidance provided by Fortify.<\/li>\n\n\n\n<li><strong>Step 2:<\/strong> Collaborate with developers to understand the vulnerable code and identify the root cause.<\/li>\n\n\n\n<li><strong>Step 3:<\/strong> Implement a secure code fix based on the provided guidance and best practices.<\/li>\n\n\n\n<li><strong>Step 4:<\/strong> Verify the fix by re-scanning the application or code section to confirm the vulnerability is resolved.<\/li>\n\n\n\n<li><strong>Step 5:<\/strong> Update the vulnerability status in Fortify Audit Workbench and share documentation for future reference.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>Remember, these are just basic tutorials! Feel free to ask any specific questions you have regarding Fortify features, use cases, or configurations. I&#8217;m here to guide you through your application security journey with Fortify!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Micro Focus Fortify? Micro Focus Fortify is a comprehensive application security (AppSec) platform that helps organizations identify and remediate vulnerabilities throughout the software development lifecycle (SDLC). It acts&#8230; <\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[2],"tags":[],"class_list":["post-42387","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/42387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=42387"}],"version-history":[{"count":1,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/42387\/revisions"}],"predecessor-version":[{"id":42405,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/42387\/revisions\/42405"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=42387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=42387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=42387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}