Security Tool Coverage Policies
Security Tool Coverage policies detect missing or incomplete use of required security scanning tools in code repositories and CI/CD pipelines. These policies cover Static Application Security Testing (SAST), Software Composition Analysis (SCA), and secrets detection.
Proper coverage ensures consistent identification of code, dependency, and credential risks before software reaches production.
The article describes the policies in this category, configuration options, and the impact of policy violations. For an overview of policies and policy management, see the Policies article.

View and manage Security Tool Coverage policies
Open each policy to view the business impact and optional settings.
SAST missing in CI/CD pipeline
Purpose: Detect code repositories that do not include an approved Static Application Security Testing (SAST) tool in the CI/CD pipeline.
Business impact: Missing SAST coverage allows preventable vulnerabilities to reach production. Common issues such as injection flaws or insecure code patterns may remain undetected. This increases the likelihood of security incidents and raises remediation costs later in the development lifecycle.

ON/OFF (toggle)
Enable/disable the policy.
ON
SAST (dropdown)
Select one or more approved SAST applications
Current setting
Ignore Application Business Priority for severity calculation (checkbox)
When enabled, severity is not adjusted based on application priority.
OFF
Ignore if OX SAST is enabled
Enable/disable.
ON
Open Source Security disabled
Purpose: Detect code repositories where an approved Software Composition Analysis (SCA) tool is configured but not enabled.
Business impact: Disabled SCA prevents detection of known vulnerabilities in third-party dependencies. Insecure or outdated components may remain in use without visibility. This increases exposure to widely exploited flaws and supply chain security incidents.

ON/OFF (toggle)
Enable/disable the policy.
ON
SCA (dropdown)
Select one or more approved SCA applications.
Current setting
Ignore Application Business Priority for severity calculation (checkbox)
When enabled, severity is not adjusted based on application priority.
OFF
Open Source Security missing in CI/CD pipeline
Purpose: Detect code repositories that do not include an approved Software Composition Analysis (SCA) tool in the CI/CD pipeline.
Business impact: Missing SCA coverage allows vulnerable third-party dependencies to enter production without detection. Known flaws in open-source components may remain unpatched and exploitable. This increases the risk of supply chain attacks and large-scale incidents similar to widely exploited dependency vulnerabilities.

ON/OFF (toggle)
Enable/disable the policy.
ON
SCA (dropdown)
Select one or more approved SCA applications.
Current setting
Ignore Application Business Priority for severity calculation (checkbox)
When enabled, severity is not adjusted based on application priority.
OFF
Ignore if OX SCA is enabled
Enable/disable.
ON
Open Source Security unsupported language
Purpose: Detect code repositories that contain dependencies written in languages not supported by the approved Software Composition Analysis (SCA) tool.
Business impact: Unsupported languages create blind spots in dependency vulnerability detection. Vulnerable third-party components may remain undiscovered and exploitable. This increases the risk of supply chain attacks and security incidents similar to widely abused dependency flaws..

ON/OFF (toggle)
Enable/disable the policy.
ON
Ignore Application Business Priority for severity calculation (checkbox)
When enabled, severity is not adjusted based on application priority.
OFF
SAST disabled
Purpose: Detect code repositories where an approved Static Application Security Testing (SAST) tool is configured but not enabled.
Business impact: Disabled SAST removes a core security control from the development process. Vulnerabilities such as injection flaws or insecure coding patterns may go undetected. This increases exposure to application compromise and raises the cost of fixing issues after deployment.

ON/OFF (toggle)
Enable/disable the policy.
ON
SAST (dropdown)
Select one or more approved SAST applications.
Current setting
Ignore Application Business Priority for severity calculation (checkbox)
When enabled, severity is not adjusted based on application priority.
OFF
SAST unsupported language
Purpose: Detect code repositories that contain source files written in languages not supported by the approved Static Application Security Testing (SAST) tool.
Business impact: Unsupported languages create gaps in application security coverage. Vulnerabilities in unscanned code may reach production without detection. This increases the risk of exploitable weaknesses and inconsistent security enforcement across the codebase.

ON/OFF (toggle)
Enable/disable the policy.
ON
Ignore Application Business Priority for severity calculation (checkbox)
When enabled, severity is not adjusted based on application priority.
OFF
Secrets detection missing in CI/CD pipeline
Purpose: Detect code repositories that do not include an approved secrets scanning tool in the CI/CD pipeline.
Business impact: Missing secrets scanning allows hardcoded credentials, tokens, or keys to reach source control and production. Exposed secrets can lead to unauthorized access to systems or cloud resources. This increases the risk of data breaches and infrastructure compromise

ON/OFF (toggle)
Enable/disable the policy.
ON
Secrets (dropdown)
Select one or more approved SAST applications.
Current setting
Ignore Application Business Priority for severity calculation (checkbox)
When enabled, severity is not adjusted based on application priority.
OFF
Ignore if OX Secret Scan is enabled
Enable/disable.
ON
View policy issues
Open the Active Issues page.
Use the Category filter and select the policy category to view related active issues.
Use the Policy filter to narrow the list to a specific policy.
Apply the Category and Policy filters separately or together, depending on how specific you want the results to be.
Use the search box to refine results, such as filtering by file name, keyword, or rule identifier.
Create or save policy profiles
When you change a policy’s severity, ON/OFF toggle or any other setting, you must save the current profile or create a new one.
To save the current profile, click SAVE in the page header.
To create a new profile, click SAVE AS in the page header. For instructions, see the section Create or edit policy profiles in the Policies article.
Last updated
