aboutsummaryrefslogtreecommitdiffstats
path: root/server/sonar-docs/src/pages/user-guide/security-reports.md
diff options
context:
space:
mode:
authoreric-therond-sonarsource <eric.therond@sonarsource.org>2020-01-28 14:50:20 +0100
committerSonarTech <sonartech@sonarsource.com>2020-02-11 20:46:10 +0100
commit1d360ec35242f8f7b4a678881ca58a39a98a2fa1 (patch)
treee8465a457d24f9a2679f760eede432436af55610 /server/sonar-docs/src/pages/user-guide/security-reports.md
parent14efddb0521487bf601198cea4813910e082b924 (diff)
downloadsonarqube-1d360ec35242f8f7b4a678881ca58a39a98a2fa1.tar.gz
sonarqube-1d360ec35242f8f7b4a678881ca58a39a98a2fa1.zip
DOCS update security related pages
Diffstat (limited to 'server/sonar-docs/src/pages/user-guide/security-reports.md')
-rw-r--r--server/sonar-docs/src/pages/user-guide/security-reports.md11
1 files changed, 5 insertions, 6 deletions
diff --git a/server/sonar-docs/src/pages/user-guide/security-reports.md b/server/sonar-docs/src/pages/user-guide/security-reports.md
index 2511ae886d4..46127c9502d 100644
--- a/server/sonar-docs/src/pages/user-guide/security-reports.md
+++ b/server/sonar-docs/src/pages/user-guide/security-reports.md
@@ -6,17 +6,16 @@ url: /user-guide/security-reports/
*Security Reports are available as part of the [Enterprise Edition](https://redirect.sonarsource.com/editions/enterprise.html) and [above](https://www.sonarsource.com/plans-and-pricing/).*
## What do Security Reports show?
-Security Reports quickly give you the big picture on your application's security, with breakdowns of just where you stand in regard to each of the [OWASP Top 10](https://www.owasp.org/index.php/Top_10-2017_Top_10), and [SANS Top 25](https://www.sans.org/top25-software-errors) categories, and [CWE](http://cwe.mitre.org/)-specific details.
+Security Reports quickly give you the big picture on your application's security, with breakdowns of just where you stand in regard to each of the [OWASP Top 10](https://www.owasp.org/index.php/Top_10-2017_Top_10), and [SANS Top 25](https://www.sans.org/top25-software-errors) categories, and [CWE](https://cwe.mitre.org/)-specific details.
The Security Reports are fed by the analyzers, which rely on the rules activated in your quality profiles to raise security issues. If there are no rules corresponding to a given OWASP category activated in your Quality Profile, you will get no issues linked to that specific category and the rating displayed will be A. That won't mean you are safe for that category, but that you need to activate more rules (assuming some exist).
## What's the difference between a Security Hotspot and a Vulnerability?
-Vulnerabilities are points in the code which are open to attack. Security Hotspots highlight security-sensitive pieces of code that need to be manually reviewed to ensure the sensitive piece of code is being used in the safest manner. Security hotspots also help educate developers on security issues.
-For more details, see [Security Hotspots](/user-guide/security-hotspots/)
-
-## Why are some Security Hotspot and Vulnerability rules very similar?
-They are overlapping on purpose. The Security Hotspot rule is supposed to include all matches of the Vulnerability rules, and cases where the taint analysis engine is not able to detect vulnerabilities. For example, switching from one language to another (XML, JNI, etc...) or using some third party libraries will prevent the taint analysis from finding vulnerabilities. A Vulnerability rule highlights security threats only when it has a high level of confidence, which means that it will always miss some of them. Whereas a Security Hotspot rule guides secure code reviews by showing code where those issues might lurk, even if it could not detect any vulnerability.
+For more details, see [Security Hotspots page](/user-guide/security-hotspots/) and to sum-up:
+* With a Hotspot, a security-sensitive piece of code is highlighted, but the overall application security may not be impacted. It's up to the developer to review the code to determine whether or not a fix is needed to secure the code.
+* With a vulnerability, a problem that impacts the application's security has been discovered that needs to be fixed immediately.
+
## Why don't I see any Vulnerabilities or Security Hotspots?
You might not see any Vulnerabilities or Security Hotspots for the following reasons: