Skip to main content

Application Security Integrations

Integrate your application security platforms with RAD Security to gain visibility into security findings, vulnerabilities, and compliance issues across your applications.

Benefits

Centralized Vulnerability View

Aggregate security findings from multiple application security tools in a unified dashboard.

Security Posture Tracking

Monitor application security trends and track remediation progress over time.

Risk Prioritization

Correlate application security findings with runtime data to prioritize critical vulnerabilities.

Compliance Reporting

Generate compliance reports that include application security scanning results.

Supported Integrations

Status: AvailableView Setup Guide →Connect GitLab to RAD Security for application security scanning and vulnerability management across your GitLab instance or groups.Key Features:
  • SAST (Static Application Security Testing) findings
  • DAST (Dynamic Application Security Testing) findings
  • Dependency scanning results
  • Container scanning results
  • Secret detection findings
  • Vulnerability severity and classification
  • Remediation guidance
Requirements:
  • GitLab instance access (cloud or self-hosted)
  • Admin or Owner role (recommended)
  • API token with read_api scope

What Data is Collected

  • SAST findings and code vulnerabilities
  • DAST findings from dynamic analysis
  • Dependency and supply chain vulnerabilities
  • Container image vulnerabilities
  • Secrets and credentials exposed in code
  • Application and project metadata
  • Repository information
  • CI/CD pipeline security job results
  • Severity and CVSS scores
  • Affected files and line numbers
  • Vulnerability descriptions and context
  • Remediation recommendations
  • Finding status and resolution tracking

Use Cases

Vulnerability Management

Track and manage application vulnerabilities from discovery through remediation.

Shift-Left Security

Identify and address security issues early in the development lifecycle.

Compliance Validation

Ensure applications meet security compliance requirements and standards.

Security Trends

Analyze security trends across applications to improve overall security posture.

Automated Remediation

Leverage RADBot to help prioritize and remediate application security findings.

Supply Chain Security

Monitor dependencies and container images for known vulnerabilities.

Getting Started

1

Choose Your Platform

Select your application security platform from the supported integrations above.
2

Generate API Credentials

Create an API token or service account with the required permissions in your platform.
3

Configure in RAD Security

Add the integration in your RAD Security workspace with the generated credentials.
4

Verify Connection

Confirm the integration is active and security findings are being synced.
5

Review Findings

Navigate to the Evidence Room to view and analyze application security findings.

Security Best Practices

Create dedicated service accounts for integrations rather than using personal tokens. This ensures continuity when team members change roles.
Only grant read-only permissions required for the integration. Application security integrations typically don’t need write access.
Rotate API tokens regularly according to your security policies to minimize risk of credential compromise.
Regularly review integration access logs and permissions to ensure appropriate usage.

Next Steps