Question: CS 3 0 5 Module Six Coding Assignment Guidelines and Rubric Overview As a software developer who develops secure code, you must add vulnerability assessments

CS 305 Module Six Coding Assignment Guidelines and Rubric
Overview
As a software developer who develops secure code, you must add vulnerability assessments to your list of code reviews. You know that the
code you write using a web application framework may only be a small percentage of the overall web application code base. Most of the
code to be compiled or interpreted for execution is locked away in libraries. Your web application depends on the code in these libraries. The
web application represents a dependency vulnerability.
In this assignment, you'll be proactive in DevSecOps. You'll find potential security vulnerabilities using the OWASP dependency scanner, an
open-source scanner. This scanner shows potential security vulnerabilities known in your code base's libraries. You can then adjust your
library use based on the dependency-check report. Doing the dependency-check process is recommended as part of DevSecOps. You have
used a dependency check in the default configuration mode. Now, you'll look at the configuration options to suppress the reporting of false
positives.
Directions
In this assignment, you will alter the current OWASP dependency check to suppress false-positive reporting. To do so, you must create a
suppression.xml file and revise the code in your software application's pom.xml file. You'll make this revision to change the configuration
settings of the dependency check in Maven and point to this suppression.xml file. Review this module's Resources section to help with this
assignment.
Specifically, you must address the following rubric criteria:
Static Testing: Using the code base provided in the Supporting Materials section, edit the pom.xml file to integrate the Maven
dependency check.
A. You may want to look at the Integrating the Maven Dependency-Check Plug-In Tutorial linked in the Supporting Materials section.
Then run a dependency check and document known vulnerabilities. Submit the HTML dependency-check report with the known
vulnerabilities found.
B. A dependency check will show false-positive vulnerabilities. You must understand the false positives. You've been told you cannot fix
the vulnerabilities you found because no solution exists. However, you don't want this warning signal to pop up for the community of
developers who will test the security of this code base.
Reconfiguration: Sometimes, you must live with an error until there is a fix for it. You must reconfigure the dependency-check tool to
stop the alarms for false positives by creating a suppression.xml file and revising the code in the pom.xml file to alter the configuration of
the dependency-check tool. By altering the configuration, you'll hide the false positives. Note: The false positives are still there, but they
won't show up on the dependency-check report. To reconfigure the dependency-check tool, complete the following steps:
A. Open the dependency report HTML file in a web browser.
B. Click the suppress button next to the found vulnerability. See the example below.
C. Click on the Complete XML Doc button. Then use CTRL+C to copy the highlighted contents as shown below. Note that CTRL+C is
the same as CTR-C in the image below.
[help]
Suppress By SHA1
^pkg:maven/org.bouncycastle/bcprov-
jdk15on@.*$
CVE-2013-1624
Complete XML Doc
Close
D. Next, navigate back to the code base project in Eclipse and create a file called suppression.xml in the same directory as the pom.xml
E. Add the contents you copied from the complete XML doc in step C to the suppression.xml file you created.
E. Add the contents you copied from the complete XML doc in step C to the suppression.xml file you created.
F. Edit the pom.xml file and add the following text in the configuration section of the OWASP check:
suppression.xml
Verification: Use Maven Run As to run the dependency check again to verify that all dependencies are valid and that no false positives
exist. Submit the HTML dependency-check report showing that all dependencies found are valid and that no false positives are present.
n addition to the dependency-check reports, be certain to zip the project folder in Eclipse and submit the refactored code, including
uppression.xml and the revised pom.xml file.
________________________________________
CS 3 0 5 Module Six Coding Assignment Guidelines

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!