Integrating Acunetix 360 with DefectDojo
DefectDojo is an open-source application security vulnerability management tool that streamlines the application security testing process. It offers features such as importing third-party security findings, merging, report generation, and security metrics.
You can integrate Acunetix 360 with DefectDojo to send issue(s) to the issue tracking system.
This topic explains how to integrate Acunetix 360 with DefectDojo and configure Acunetix 360 to send a detected vulnerability to DefectDojo.
For further information, see What Systems Does Acunetix 360 Integrate With?.
This table lists and explains the DefectDojo fields in the New DefectDojo Integration window.
This is the name of the configuration that will be shown in menus.
This section contains fields that must be completed.
This is the DefectDojo instance URL.
This is the Access Token for authentication.
This is the project identifier of the issue.
This is the string format that is used to create the vulnerability title.
This section contains optional fields.
This is the name of the environment. This can be, for example, production, staging, etc.
This is the issue's tags.
You need to have DefectDojo Version 2.14.0.
How to Integrate Acunetix 360 with DefectDojo
- Log in to Acunetix 360.
- From the main menu, go to Integrations > New Integration > DefectDojo.
- In the Name field, enter a name for the integration.
- In the Mandatory section, complete the connection details:
- Server URL
- Access Token
- Engagement Id
- Title Format
- In the Optional section, add tags if required.
- Select Save.
You can select Test Credentials to confirm that Acunetix 360 can connect to the configured system.
How to Export Reported Vulnerabilities to Projects in DefectDojo
Please ensure that you have first configured DefectDojo integration (see How to Integrate Acunetix 360 with DefectDojo).
Once notifications have been configured, you can configure Acunetix 360 to automatically send vulnerabilities after scanning has been completed. For further information, see How to Configure a Notification to Report Vulnerabilities to an Issue Tracking System.