Use Case: UC12 - Integration of Vulnerability Scanning Tool
- Author: Joni Nisula
- Date / Version: 08/07/2025 - v0.1
User Roles
Role | Description |
---|---|
Development Team | Develops and maintains the product, addresses identified vulnerabilities |
Vulnerability Scanning Tool | Automated tool integrated into the workflow to scan and report vulnerabilities |
System Administrator | Manages the integration and configuration of the scanning tool within the workflow |
Clients | End users who benefit from the product's adherence to security best practices |
Prerequisites / Conditions
- The vulnerability scanning tool is selected and available for integration.
- The development workflow is defined and accessible for integration.
- The team has access to the software implementation to be scanned.
- Necessary permissions and access rights are configured for the scanning tool.
Use Case Diagram
Description of Use Case - Implementation of Vulnerability Scanning Tool
- The system administrator configures the vulnerability scanning tool for integration into the development workflow.
- The vulnerability scanning tool integrates with the existing development workflow.
- The workflow system triggers an automated vulnerability scan.
- The scanning tool performs the scan on the software implementation.
- The scanning tool generates a report of identified vulnerabilities and sends it to the development team.
- The development team reviews the report and addresses the identified vulnerabilities.
- The development team updates the workflow system with fixes and improvements.
- The workflow system confirms the resolution of vulnerabilities to the system administrator.
Exceptions
ID | Description |
---|---|
E1 | Scan tool integration failure |
E2 | Scan initiation failure |
E3 | Incomplete vulnerability report |
E4 | Critical vulnerabilities identified |
E5 | Workflow update failure |
E6 | Vulnerability resolution delay |
E7 | Access rights issues |
E8 | False positives in vulnerability report |
E9 | Tool configuration error |
Result
The vulnerability scanning tool is successfully implemented and integrated into the workflow, providing automated vulnerability reports and ensuring that the product is developed and maintained with best security practices. This leads to greater customer satisfaction and trust in the product's security.
Use Frequency
High: Regular vulnerability scans should be conducted as part of the continuous integration and deployment process to ensure ongoing security and compliance.
Additional Information
- Ensure the vulnerability scanning tool is regularly updated to detect the latest security threats.
- Provide training for the development team on interpreting vulnerability reports and addressing identified issues.
- Maintain clear communication channels with clients regarding security practices and vulnerability management.