{"id":450,"date":"2019-04-10T03:06:52","date_gmt":"2019-04-10T03:06:52","guid":{"rendered":"http:\/\/blog.um-palembang.ac.id\/sayfudin\/?p=450"},"modified":"2019-04-10T03:06:52","modified_gmt":"2019-04-10T03:06:52","slug":"application-vulnerability-correlation-and-security-orchestration-application","status":"publish","type":"post","link":"http:\/\/blog.um-palembang.ac.id\/sayfudin\/application-vulnerability-correlation-and-security-orchestration-application\/","title":{"rendered":"Application Vulnerability Correlation And Security Orchestration Application"},"content":{"rendered":"<div class=\"separator\"><a href=\"https:\/\/3.bp.blogspot.com\/-OLLpNvzPCvo\/XKLAokEHhRI\/AAAAAAAAOaU\/Un3mn7Jiy3o4sPI4FKJbukcH_dxb0mTZQCLcBGAs\/s1600\/django-DefectDojo_8_screenshot1.png\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/3.bp.blogspot.com\/-OLLpNvzPCvo\/XKLAokEHhRI\/AAAAAAAAOaU\/Un3mn7Jiy3o4sPI4FKJbukcH_dxb0mTZQCLcBGAs\/s640\/django-DefectDojo_8_screenshot1.png\" width=\"640\" height=\"330\" border=\"0\" data-original-height=\"826\" data-original-width=\"1600\" \/><\/a><\/div>\n<p>&nbsp;<\/p>\n<div><a title=\"DefectDojo\" href=\"https:\/\/www.defectdojo.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DefectDojo<\/a> is a security program and vulnerability <a title=\"management\" href=\"https:\/\/www.kitploit.com\/search\/label\/Management\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">management<\/a> tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage <a title=\"vulnerabilities\" href=\"https:\/\/www.kitploit.com\/search\/label\/vulnerabilities\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">vulnerabilities<\/a> and push findings into defect trackers. Consolidate your findings into one source of truth with DefectDojo.<\/div>\n<div><b>Demo<\/b><br \/>\nTry out <a title=\"DefectDojo\" href=\"https:\/\/www.kitploit.com\/search\/label\/DefectDojo\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DefectDojo<\/a> in the\u00a0<a title=\"testing environment\" href=\"https:\/\/defectdojo.herokuapp.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">testing environment<\/a> with the following credentials.<\/p>\n<ul>\n<li>admin \/ defectdojo@demo#appsec<\/li>\n<li>product_manager \/ defectdojo@demo#product<\/li>\n<\/ul>\n<p><b>Quick Start<\/b><\/p>\n<div>\n<pre><code>git clone <a class=\"vglnk\" href=\"https:\/\/github.com\/DefectDojo\/django-DefectDojo\" rel=\"nofollow\">https:\/\/github.com\/DefectDojo\/django-DefectDojo<\/a>\r\ncd django-DefectDojo\r\ndocker-compose up<\/code><\/pre>\n<\/div>\n<p>Navigate to <a title=\"http:\/\/localhost:8080\" href=\"http:\/\/localhost:8080\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">http:\/\/localhost:8080<\/a>.<\/p>\n<p><b>Documentation<\/b><br \/>\nFor detailed documentation you can visit <a title=\"Read the Docs\" href=\"https:\/\/defectdojo.readthedocs.io\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Read the Docs<\/a>.<\/p>\n<p><b>Installation Options<\/b><\/p>\n<ul>\n<li><a title=\"Kubernetes\" href=\"https:\/\/github.com\/DefectDojo\/django-DefectDojo\/blob\/master\/KUBERNETES.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Kubernetes<\/a><\/li>\n<li><a title=\"Docker\" href=\"https:\/\/github.com\/DefectDojo\/django-DefectDojo\/blob\/master\/DOCKER.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Docker<\/a><\/li>\n<\/ul>\n<p><b>Getting Started<\/b><br \/>\nWe recommend checking out the <a title=\"about\" href=\"https:\/\/defectdojo.readthedocs.io\/en\/latest\/about.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">about<\/a> document to learn the terminology of DefectDojo and the <a title=\"getting started guide\" href=\"https:\/\/defectdojo.readthedocs.io\/en\/latest\/getting-started.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">getting started guide<\/a> for setting up a new installation. We&#8217;ve also created some example <a title=\"workflows\" href=\"https:\/\/defectdojo.readthedocs.io\/en\/latest\/workflows.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">workflows<\/a> that should give you an idea of how to use DefectDojo for your own team.<\/p>\n<p><b>Client APIs<\/b><\/p>\n<ul>\n<li>Install the DefectDojo Python API via <code>pip install defectdojo_api<\/code> or clone the <a title=\"repository\" href=\"https:\/\/github.com\/aaronweaver\/defectdojo_api\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">repository<\/a>.<\/li>\n<li>Browse the API on <a title=\"SwaggerHub\" href=\"https:\/\/app.swaggerhub.com\/apis\/DefectDojo\/defect-dojo_api_v_2\/1.0.0\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SwaggerHub<\/a>.<\/li>\n<\/ul>\n<p><b>Getting Involved<\/b><\/p>\n<p>Realtime discussion is done in the OWASP Slack Channel, #defectdojo. <a title=\"Get Access.\" href=\"http:\/\/owaspslack.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Get Access.<\/a><br \/>\n<a title=\"DefectDojo \" href=\"https:\/\/twitter.com\/defect_dojo\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DefectDojo <\/a><a title=\"Twitter\" href=\"https:\/\/www.kitploit.com\/search\/label\/Twitter\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Twitter<\/a> Account tweets project updates and changes.<\/p>\n<p><b>Available Plugins<\/b><br \/>\n<a title=\"Engagement Surveys\" href=\"https:\/\/github.com\/grendel513\/defectDojo-engagement-survey\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Engagement Surveys<\/a> \u2013 A plugin that adds answerable surveys to engagements.<br \/>\n<a title=\"LDAP Integration\" href=\"https:\/\/django-auth-ldap.readthedocs.io\/en\/latest\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">LDAP Integration<\/a><br \/>\n<a title=\"SAML Integration\" href=\"https:\/\/pypi.python.org\/pypi\/djangosaml2\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SAML Integration<\/a><br \/>\n<a title=\"Multi-Factor Auth\" href=\"https:\/\/django-mfa.readthedocs.io\/en\/latest\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Multi-Factor Auth<\/a><\/p>\n<p><b>About Us<\/b><br \/>\nDefectDojo is maintained by:<\/p>\n<ul>\n<li><a title=\"Greg Anderson\" href=\"https:\/\/www.linkedin.com\/in\/g-anderson\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Greg Anderson<\/a><\/li>\n<li><a title=\"Aaron Weaver\" href=\"https:\/\/www.linkedin.com\/in\/aweaver\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Aaron Weaver<\/a> (<a title=\"@weavera\" href=\"https:\/\/twitter.com\/weavera\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">@weavera<\/a>)<\/li>\n<li><a title=\"Matt Tesauro\" href=\"https:\/\/www.linkedin.com\/in\/matttesauro\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Matt Tesauro<\/a> (<a title=\"@matt_tesauro\" href=\"https:\/\/twitter.com\/matt_tesauro\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">@matt_tesauro<\/a>)<\/li>\n<\/ul>\n<p><b>Hall of Fame<\/b><\/p>\n<ul>\n<li>Charles Neill (<a title=\"@ccneill\" href=\"https:\/\/twitter.com\/ccneill\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">@ccneill<\/a>) \u2013 <a title=\"Charles\" href=\"https:\/\/www.kitploit.com\/search\/label\/Charles\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Charles<\/a> served as a DefectDojo Maintainer for years and wrote some of Dojo&#8217;s core functionality.<\/li>\n<li>Jay Paz (<a title=\"@jjpaz\" href=\"https:\/\/twitter.com\/jjpaz\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">@jjpaz<\/a>) \u2013 Jay was a DefectDojo maintainer for years. He performed Dojo&#8217;s first UI overhaul, optomized code structure\/features, and added numerous enhancements.<\/li>\n<\/ul>\n<div><b><a class=\"kiploit-download\" title=\"Download django-DefectDojo\" href=\"https:\/\/github.com\/DefectDojo\/django-DefectDojo\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Download django-DefectDojo<\/a><\/b><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; DefectDojo is a security program and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers. Consolidate your findings into one source of truth with DefectDojo. Demo Try out DefectDojo in the\u00a0testing environment with the following credentials. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":452,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":""},"categories":[11],"tags":[],"_links":{"self":[{"href":"http:\/\/blog.um-palembang.ac.id\/sayfudin\/wp-json\/wp\/v2\/posts\/450"}],"collection":[{"href":"http:\/\/blog.um-palembang.ac.id\/sayfudin\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.um-palembang.ac.id\/sayfudin\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.um-palembang.ac.id\/sayfudin\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.um-palembang.ac.id\/sayfudin\/wp-json\/wp\/v2\/comments?post=450"}],"version-history":[{"count":1,"href":"http:\/\/blog.um-palembang.ac.id\/sayfudin\/wp-json\/wp\/v2\/posts\/450\/revisions"}],"predecessor-version":[{"id":453,"href":"http:\/\/blog.um-palembang.ac.id\/sayfudin\/wp-json\/wp\/v2\/posts\/450\/revisions\/453"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/blog.um-palembang.ac.id\/sayfudin\/wp-json\/wp\/v2\/media\/452"}],"wp:attachment":[{"href":"http:\/\/blog.um-palembang.ac.id\/sayfudin\/wp-json\/wp\/v2\/media?parent=450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.um-palembang.ac.id\/sayfudin\/wp-json\/wp\/v2\/categories?post=450"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.um-palembang.ac.id\/sayfudin\/wp-json\/wp\/v2\/tags?post=450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}