Application Security Integrations
Integrate your application security platforms with RAD Security to gain visibility into security findings, vulnerabilities, and compliance issues across your applications.Benefits
Centralized Vulnerability View
Aggregate security findings from multiple application security tools in a unified dashboard.
Security Posture Tracking
Monitor application security trends and track remediation progress over time.
Risk Prioritization
Correlate application security findings with runtime data to prioritize critical vulnerabilities.
Compliance Reporting
Generate compliance reports that include application security scanning results.
Supported Integrations
GitLab
GitLab
Status: AvailableView Setup Guide →Connect GitLab to RAD Security for application security scanning and vulnerability management across your GitLab instance or groups.Key Features:
- SAST (Static Application Security Testing) findings
- DAST (Dynamic Application Security Testing) findings
- Dependency scanning results
- Container scanning results
- Secret detection findings
- Vulnerability severity and classification
- Remediation guidance
- GitLab instance access (cloud or self-hosted)
- Admin or Owner role (recommended)
- API token with
read_apiscope
What Data is Collected
Security Findings
Security Findings
- SAST findings and code vulnerabilities
- DAST findings from dynamic analysis
- Dependency and supply chain vulnerabilities
- Container image vulnerabilities
- Secrets and credentials exposed in code
Application Data
Application Data
- Application and project metadata
- Repository information
- CI/CD pipeline security job results
Vulnerability Details
Vulnerability Details
- Severity and CVSS scores
- Affected files and line numbers
- Vulnerability descriptions and context
- Remediation recommendations
- Finding status and resolution tracking
Use Cases
Vulnerability Management
Track and manage application vulnerabilities from discovery through remediation.
Shift-Left Security
Identify and address security issues early in the development lifecycle.
Compliance Validation
Ensure applications meet security compliance requirements and standards.
Security Trends
Analyze security trends across applications to improve overall security posture.
Automated Remediation
Leverage RADBot to help prioritize and remediate application security findings.
Supply Chain Security
Monitor dependencies and container images for known vulnerabilities.
Getting Started
1
Choose Your Platform
Select your application security platform from the supported integrations above.
2
Generate API Credentials
Create an API token or service account with the required permissions in your platform.
3
Configure in RAD Security
Add the integration in your RAD Security workspace with the generated credentials.
4
Verify Connection
Confirm the integration is active and security findings are being synced.
5
Review Findings
Navigate to the Evidence Room to view and analyze application security findings.
Security Best Practices
Use Service Accounts
Use Service Accounts
Create dedicated service accounts for integrations rather than using personal tokens. This ensures continuity when team members change roles.
Minimal Permissions
Minimal Permissions
Only grant read-only permissions required for the integration. Application security integrations typically don’t need write access.
Token Rotation
Token Rotation
Rotate API tokens regularly according to your security policies to minimize risk of credential compromise.
Audit Access
Audit Access
Regularly review integration access logs and permissions to ensure appropriate usage.