{"id":42861,"date":"2024-01-27T11:47:44","date_gmt":"2024-01-27T11:47:44","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=42861"},"modified":"2024-01-27T11:47:47","modified_gmt":"2024-01-27T11:47:47","slug":"what-is-fortify-and-use-cases-of-fortify","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/what-is-fortify-and-use-cases-of-fortify\/","title":{"rendered":"What is Fortify and use cases of Fortify?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is Fortify?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"422\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-420.png\" alt=\"\" class=\"wp-image-42862\" style=\"width:501px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-420.png 750w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-420-300x169.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-420-355x199.png 355w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption class=\"wp-element-caption\"><strong><em>What is Fortify<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>Fortify is a comprehensive <strong>application security (AppSec)<\/strong> platform developed by Micro Focus. It empowers organizations to <strong>proactively identify and address vulnerabilities<\/strong> throughout the entire software development lifecycle (SDLC). Think of it as a security shield woven into the fabric of your development process, helping you build secure software from the ground up.<\/p>\n\n\n\n<p><strong>Fortify offers a suite of tools and services covering various aspects of AppSec:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Static Application Security Testing (SAST):<\/strong> Analyzes source code for vulnerabilities like buffer overflows, cross-site scripting (XSS), and SQL injection.<\/li>\n\n\n\n<li><strong>Dynamic Application Security Testing (DAST):<\/strong> Simulates real-world attacks to uncover vulnerabilities in running applications.<\/li>\n\n\n\n<li><strong>Software Composition Analysis (SCA):<\/strong> Identifies and assesses security risks within third-party libraries and components used in your software.<\/li>\n\n\n\n<li><strong>Interactive Application Security Testing (IAST):<\/strong> Provides real-time feedback to developers during their coding process, pinpointing potential vulnerabilities early on.<\/li>\n\n\n\n<li><strong>Web Application Security Testing (WAST):<\/strong> Focuses on identifying vulnerabilities specific to web applications.<\/li>\n\n\n\n<li><strong>Security Risk Management (SRM):<\/strong> Prioritizes vulnerabilities, tracks remediation progress, and reports on overall AppSec posture.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Top 10 use cases of Fortify?<\/h2>\n\n\n\n<p>Top 10 Use Cases of Fortify:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Compliance and Regulations:<\/strong> Meet compliance requirements like PCI DSS, HIPAA, and GDPR by ensuring secure software practices.<\/li>\n\n\n\n<li><strong>Reduce Breaches and Data Loss:<\/strong> Proactively identify and address vulnerabilities before they can be exploited by attackers.<\/li>\n\n\n\n<li><strong>Shift Left Security:<\/strong> Integrate AppSec tools early in the SDLC to catch vulnerabilities early and save time and effort.<\/li>\n\n\n\n<li><strong>DevSecOps Adoption:<\/strong> Foster collaboration between development and security teams for a unified approach to security.<\/li>\n\n\n\n<li><strong>Improve Software Quality:<\/strong> Build secure and reliable software that reduces post-release security issues and maintenance costs.<\/li>\n\n\n\n<li><strong>Third-Party Software Risk Management:<\/strong> Manage security risks associated with third-party libraries and components used in your software.<\/li>\n\n\n\n<li><strong>Continuous Security Monitoring:<\/strong> Continuously monitor applications for vulnerabilities and suspicious activity for proactive protection.<\/li>\n\n\n\n<li><strong>Automate Security Tasks:<\/strong> Automate repetitive security tasks like vulnerability scanning and reporting to improve efficiency.<\/li>\n\n\n\n<li><strong>Improve Developer Security Awareness:<\/strong> Train and educate developers on secure coding practices and vulnerability identification.<\/li>\n\n\n\n<li><strong>Measure and Report Security Posture:<\/strong> Track progress and demonstrate the effectiveness of your AppSec initiatives to stakeholders.<\/li>\n<\/ol>\n\n\n\n<p>By leveraging Fortify&#8217;s capabilities, organizations can significantly <strong>enhance their security posture, build more secure software, and minimize the risk of costly security breaches.<\/strong><\/p>\n\n\n\n<p>Fortify is just one piece of the AppSec puzzle. It&#8217;s crucial to adopt a holistic approach to security that encompasses secure coding practices, security awareness training, and incident response planning.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the feature of Fortify?<\/h2>\n\n\n\n<p>Fortify boasts a comprehensive set of features across its various AppSec tools, catering to different aspects of software security:<\/p>\n\n\n\n<p><strong>Static Application Security Testing (SAST):<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Deep source code analysis:<\/strong> Scans all code sections (including libraries and frameworks) for vulnerabilities like buffer overflows, XSS, SQL injection, and insecure coding practices.<\/li>\n\n\n\n<li><strong>Context-aware analysis:<\/strong> Considers the context of code usage to prioritize vulnerabilities based on potential impact and exploitability.<\/li>\n\n\n\n<li><strong>Compliance mapping:<\/strong> Identifies vulnerabilities relevant to specific compliance requirements like PCI DSS or HIPAA.<\/li>\n\n\n\n<li><strong>Customizable rules and patterns:<\/strong> Develop and integrate custom rules and patterns to address specific security concerns or industry standards.<\/li>\n\n\n\n<li><strong>Integration with IDEs and CI\/CD pipelines:<\/strong> Seamlessly integrate SAST scans into development workflows for early vulnerability detection.<\/li>\n<\/ul>\n\n\n\n<p><strong>Dynamic Application Security Testing (DAST):<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Black-box and gray-box scanning:<\/strong> Simulates real-world attack vectors like SQL injection, XSS, and CSRF to uncover exploitable vulnerabilities.<\/li>\n\n\n\n<li><strong>Interactive and automated scanning:<\/strong> Conduct scans manually or schedule automated scans for continuous security monitoring.<\/li>\n\n\n\n<li><strong>Session recording and replay:<\/strong> Record attack sessions and replay them to pinpoint vulnerability locations and demonstrate exploitability.<\/li>\n\n\n\n<li><strong>API security testing:<\/strong> Dedicated capabilities for identifying vulnerabilities in web APIs.<\/li>\n\n\n\n<li><strong>Integration with vulnerability management tools:<\/strong> Streamline vulnerability reporting and remediation workflow.<\/li>\n<\/ul>\n\n\n\n<p><strong>Software Composition Analysis (SCA):<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Comprehensive component identification:<\/strong> Automatically identify open-source, commercial, and internal libraries and components used in your software.<\/li>\n\n\n\n<li><strong>Vulnerability database:<\/strong> Scans identified components against an extensive database of known vulnerabilities in third-party software.<\/li>\n\n\n\n<li><strong>License compliance checks:<\/strong> Identify potential license violations associated with third-party components.<\/li>\n\n\n\n<li><strong>Dependency management recommendations:<\/strong> Suggest alternative components or versions with fewer vulnerabilities or license conflicts.<\/li>\n\n\n\n<li><strong>Integration with build and deployment processes:<\/strong> Integrate SCA checks into your development workflow to prevent vulnerable components from entering production.<\/li>\n<\/ul>\n\n\n\n<p><strong>Interactive Application Security Testing (IAST):<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Real-time feedback during coding:<\/strong> Provides instant alerts and guidance to developers as they write code, highlighting potential vulnerabilities and suggesting secure coding practices.<\/li>\n\n\n\n<li><strong>Integration with IDEs:<\/strong> Integrates seamlessly with popular IDEs for a smooth and unobtrusive development experience.<\/li>\n\n\n\n<li><strong>Language and framework support:<\/strong> Supports a wide range of programming languages and frameworks, enabling broad applicability.<\/li>\n\n\n\n<li><strong>Customizable rules and feedback:<\/strong> Configure IAST rules and feedback to align with your specific security policies and coding standards.<\/li>\n\n\n\n<li><strong>Proactive vulnerability detection:<\/strong> Helps developers prevent vulnerabilities from being introduced into code in the first place.<\/li>\n<\/ul>\n\n\n\n<p><strong>Additional Features:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Centralized vulnerability management:<\/strong> Track, prioritize, and remediate vulnerabilities across all tools and applications.<\/li>\n\n\n\n<li><strong>Reporting and dashboards:<\/strong> Generate detailed reports and visualize security posture through interactive dashboards.<\/li>\n\n\n\n<li><strong>Integration with other security tools:<\/strong> Integrates with SIEM, SOAR, and other security platforms for comprehensive security orchestration.<\/li>\n\n\n\n<li><strong>Scalability and customization:<\/strong> Adapts to organizations of all sizes and supports customization to meet specific security needs.<\/li>\n<\/ul>\n\n\n\n<p>These features demonstrate Fortify&#8217;s commitment to providing a comprehensive and integrated AppSec platform. Whether you&#8217;re focused on SAST, DAST, SCA, IAST, or other aspects of security, Fortify offers powerful tools and capabilities to empower your security posture and build secure software.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Fortify works and Architecture?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"472\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-421-1024x472.png\" alt=\"\" class=\"wp-image-42863\" style=\"width:683px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-421-1024x472.png 1024w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-421-300x138.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-421-768x354.png 768w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-421.png 1154w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Fortify works and Architecture<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>Fortify works through a multi-layered approach to application security, utilizing different tools and techniques to analyze your software comprehensively. Here&#8217;s a breakdown of its key elements and workflow:<\/p>\n\n\n\n<p><strong>1. Security Analysis:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SAST:<\/strong> Scans source code for vulnerabilities using static analysis engines that identify security issues based on predefined rules and patterns.<\/li>\n\n\n\n<li><strong>DAST:<\/strong> Simulates real-world attacks by crawling web applications and APIs, searching for exploitable vulnerabilities like XSS or SQL injection.<\/li>\n\n\n\n<li><strong>SCA:<\/strong> analyzes software components like libraries and frameworks to identify known vulnerabilities and potential license conflicts.<\/li>\n\n\n\n<li><strong>IAST:<\/strong> Integrates with developer workflows, providing real-time feedback and guidance during coding to prevent vulnerabilities from being introduced.<\/li>\n<\/ul>\n\n\n\n<p><strong>2. Vulnerability Identification and Prioritization:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Each tool identifies potential vulnerabilities and assigns them severity levels based on their exploitability and potential impact.<\/li>\n\n\n\n<li>Fortify consolidates findings from different tools into a central vulnerability database.<\/li>\n\n\n\n<li>Advanced algorithms prioritize vulnerabilities based on factors like exploitability, potential impact, and ease of remediation.<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Reporting and Remediation:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fortify generates detailed reports summarizing vulnerabilities, their severity, and recommended remediation steps.<\/li>\n\n\n\n<li>The platform integrates with issue tracking systems to facilitate assignment and tracking of remediation tasks.<\/li>\n\n\n\n<li>Developers can leverage built-in code fix suggestions and secure coding guidance to address vulnerabilities efficiently.<\/li>\n<\/ul>\n\n\n\n<p><strong>4. Continuous Monitoring and Improvement:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fortify can be integrated into CI\/CD pipelines to automate security scans throughout the development lifecycle.<\/li>\n\n\n\n<li>This enables continuous monitoring for vulnerabilities and ensures security remains a core consideration throughout the development process.<\/li>\n\n\n\n<li>Organizations can track progress and measure the effectiveness of their AppSec initiatives using reports and dashboards.<\/li>\n<\/ul>\n\n\n\n<p><strong>Architecture:<\/strong><\/p>\n\n\n\n<p>Fortify employs a <strong>modular architecture<\/strong> consisting of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Core Platform:<\/strong> Provides the foundation for managing users, projects, scans, and vulnerability data.<\/li>\n\n\n\n<li><strong>Scanners:<\/strong> Different scanners dedicated to SAST, DAST, SCA, and IAST functionalities.<\/li>\n\n\n\n<li><strong>Integrations:<\/strong> Connectors to IDEs, CI\/CD pipelines, and other security tools.<\/li>\n\n\n\n<li><strong>Reporting and Analytics:<\/strong> Generates reports, dashboards, and insights for vulnerability management and security posture assessment.<\/li>\n<\/ul>\n\n\n\n<p>This modular design allows for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Scalability:<\/strong> Adapts to organizations of all sizes by adjusting the number and configuration of scanner instances.<\/li>\n\n\n\n<li><strong>Extensibility:<\/strong> Integrates seamlessly with existing development and security tools.<\/li>\n\n\n\n<li><strong>Customization:<\/strong> Tailors vulnerability analysis and reporting to specific security needs and compliance requirements.<\/li>\n<\/ul>\n\n\n\n<p><strong>Benefits of Fortify Architecture:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Comprehensive Analysis:<\/strong> Combines different security techniques for a holistic view of software vulnerabilities.<\/li>\n\n\n\n<li><strong>Streamlined Workflow:<\/strong> Integrates with development and security processes for efficient vulnerability management.<\/li>\n\n\n\n<li><strong>Continuous Improvement:<\/strong> Enables continuous monitoring and proactive vulnerability detection throughout the SDLC.<\/li>\n<\/ul>\n\n\n\n<p><strong>Note:<\/strong> Fortify is a powerful tool, but a successful AppSec strategy requires more than just technology. Implementing secure coding practices, promoting security awareness among developers, and having a robust incident response plan are crucial aspects of building and maintaining secure software.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Install Fortify it?<\/h2>\n\n\n\n<p>Installing Fortify can vary depending on the specific product and desired deployment model (on-premises, cloud, containerized). Here&#8217;s an overview of the general steps:<\/p>\n\n\n\n<p><strong>1. System Requirements:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensure your system meets the hardware and software requirements specified for your chosen Fortify product.<\/li>\n\n\n\n<li>This typically includes details on operating system versions, supported databases, and specific software dependencies.<\/li>\n<\/ul>\n\n\n\n<p><strong>2. License and Download:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Obtain a valid license for the Fortify product you wish to install.<\/li>\n\n\n\n<li>Contact Micro Focus or your authorized reseller for license acquisition and download instructions.<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Deployment Method:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>On-premises installation:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Download the installation package and follow the detailed installation guide provided by Micro Focus.<\/li>\n\n\n\n<li>This typically involves manual configuration of server components, databases, and application settings.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Cloud deployment:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Micro Focus offers several Fortify products as cloud-hosted services.<\/li>\n\n\n\n<li>Follow the specific setup instructions provided for your chosen cloud service (e.g., AWS Marketplace, Azure Marketplace).<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Containerized deployment:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Some Fortify components are available as Docker containers.<\/li>\n\n\n\n<li>Utilize container orchestration tools like Docker Compose or Kubernetes to deploy and manage the containerized environment.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>4. Configuration and Testing:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Once installed, configure the Fortify application according to your needs.<\/li>\n\n\n\n<li>This includes setting up user accounts, projects, scan settings, and integrations with other systems.<\/li>\n\n\n\n<li>Perform test scans and verify proper functionality before relying on the system for actual vulnerability assessments.<\/li>\n<\/ul>\n\n\n\n<p><strong>Tip:<\/strong> Installing Fortify can be complex and require technical expertise, especially for on-premises deployments. Consider consulting with Micro Focus support or authorized partners for assistance if needed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Basic Tutorials of Fortify: Getting Started<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"920\" height=\"500\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-422.png\" alt=\"\" class=\"wp-image-42864\" style=\"width:624px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-422.png 920w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-422-300x163.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-422-768x417.png 768w\" sizes=\"auto, (max-width: 920px) 100vw, 920px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Basic Tutorials of Fortify<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>Fortify offers various tools and workflows for security analysis, but let&#8217;s dive into some basic tutorials to get you started:<\/p>\n\n\n\n<p><strong>1. Static Application Security Testing (SAST):<\/strong><\/p>\n\n\n\n<p><strong>a. Setting Up:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Download and install Fortify SCA (Static Code Analyzer) based on your chosen platform (Windows, macOS, Linux).<\/li>\n\n\n\n<li>Configure your IDE plugin (optional) for seamless integration with your development environment.<\/li>\n<\/ul>\n\n\n\n<p><strong>b. Scanning a Project:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Import your project source code into Fortify SCA.<\/li>\n\n\n\n<li>Define the scan scope (e.g., specific files, directories, or entire project).<\/li>\n\n\n\n<li>Choose the desired scan profile (e.g., basic, advanced, custom).<\/li>\n<\/ul>\n\n\n\n<p><strong>c. Analyzing Results:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fortify SCA will scan your code and identify potential vulnerabilities.<\/li>\n\n\n\n<li>Review the reported vulnerabilities, including severity levels, descriptions, and remediation guidance.<\/li>\n\n\n\n<li>Prioritize vulnerabilities based on their risk and impact.<\/li>\n<\/ul>\n\n\n\n<p><strong>d. Fix and Re-scan:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Address the identified vulnerabilities by fixing the code according to the provided remediation advice.<\/li>\n\n\n\n<li>Re-scan your project to verify if the vulnerabilities have been fixed successfully.<\/li>\n<\/ul>\n\n\n\n<p><strong>2. Software Composition Analysis (SCA):<\/strong><\/p>\n\n\n\n<p><strong>a. Integrating with Build Pipeline:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Integrate Fortify SCA with your build pipeline to automate security checks during development and deployment.<\/li>\n\n\n\n<li>Configure SCA to scan third-party libraries and dependencies used in your project.<\/li>\n<\/ul>\n\n\n\n<p><strong>b. Detecting Vulnerable Dependencies:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SCA will analyze your dependencies and identify any known vulnerabilities associated with them.<\/li>\n\n\n\n<li>Review the reported vulnerabilities and their potential impact on your application.<\/li>\n<\/ul>\n\n\n\n<p><strong>c. Managing Dependencies:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Update vulnerable dependencies to patched versions recommended by Fortify SCA.<\/li>\n\n\n\n<li>Consider alternative libraries or implement mitigation strategies if updates are not available.<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Web Application Security Testing (WAST):<\/strong><\/p>\n\n\n\n<p><strong>a. Setting Up Scanner:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configure Fortify WebInspect, the WAST tool, to target your web application URL.<\/li>\n\n\n\n<li>Define the scan scope (e.g., specific pages, functionalities, or entire website).<\/li>\n<\/ul>\n\n\n\n<p><strong>b. Scanning for Vulnerabilities:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>WebInspect will crawl your website and identify potential security vulnerabilities like SQL injection, cross-site scripting, and insecure configurations.<\/li>\n<\/ul>\n\n\n\n<p><strong>c. Analyzing Results:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Review the reported vulnerabilities, including their exploitability and potential impact.<\/li>\n\n\n\n<li>Prioritize vulnerabilities based on their severity and focus on patching the most critical ones first.<\/li>\n<\/ul>\n\n\n\n<p><strong>d. Fix and Re-scan:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implement security patches or apply mitigation strategies to address the identified vulnerabilities.<\/li>\n\n\n\n<li>Re-scan your website to verify if the vulnerabilities have been fixed successfully.<\/li>\n<\/ul>\n\n\n\n<p><strong>Bonus Tips:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Utilize Fortify&#8217;s reporting and dashboard features to track progress, visualize trends, and measure security improvement.<\/li>\n\n\n\n<li>Consider leveraging Fortify&#8217;s DAST (Dynamic Application Security Testing) capabilities for deeper vulnerability analysis.<\/li>\n\n\n\n<li>Remember, Fortify is a powerful tool, but it&#8217;s crucial to understand security concepts and interpret results effectively.<\/li>\n<\/ul>\n\n\n\n<p>These basic tutorials provide a starting point for your Fortify journey. Remember, continuous security testing and vulnerability management are crucial for building and maintaining secure software systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Fortify? Fortify is a comprehensive application security (AppSec) platform developed by Micro Focus. It empowers organizations to proactively identify and address vulnerabilities throughout the entire software development lifecycle&#8230; <\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[2],"tags":[],"class_list":["post-42861","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/42861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=42861"}],"version-history":[{"count":1,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/42861\/revisions"}],"predecessor-version":[{"id":42865,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/42861\/revisions\/42865"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=42861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=42861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=42861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}