Cloud Application Security Assessment (CASA) requirements are based on the OWASP Application Security Verification Standard (ASVS). Failure to implement them is associated with CWE entries. A software application must meet all 73 CASA requirements, regardless of their CWE rating, to pass the assessment. Keep in mind that annual revalidations are required to maintain compliance.
Currently, App Defense Alliance's instructions on using Fluid Attacks' scanner are outdated. This page provides an updated guide to successfully scan your application and validate its compliance with CASA Tier 2 requirements.
You do not need to create a Dockerfile to run Fluid Attacks' CASA-recommended scanner. Follow these steps to execute the scan:
config.yaml
file and the directory or files you want to scan. Your folder structure should resemble this:- home/
- fluid_scanner/
- config.yaml
- my_app/
# Place all the code you want to scan inside this "my_app/" folder
config.yaml
:namespace: my_app
working_dir: /working-dir/my_app
output:
file_path: /working-dir/Fluid-Attacks-Results.csv
format: CSV
language: EN
apk:
include:
- glob(**/*.apk)
sast:
include:
- .
exclude:
# Directories created by package managers, e.g., node_modules, vendor, dist.
- glob(**/node_modules/**)
sca:
include:
- .
Open a terminal and change the directories to fluid_scanner
(or whichever directory wherein you placed your application code and "config" file in).
Run the following command to execute the scan:
docker run -v /your/local/dir:/working-dir fluidattacks/cli:latest skims scan /working-dir/config.yaml
working-dir
is just a placeholder for the directory name where you want to mount your local directory. You can use any name you want as long as you remember to change it also in the config.yaml
file.
If the scan completes successfully, the CSV file containing the scan results is created next to the
config.yaml
file in the fluid_scanner
folder.
Please read the FAQ page if you encounter any problems.