Fluid Attacks News logo

News

Subscribe to Updates

Labels

  • All Posts
  • Fix
  • Announcement
  • Improvement
  • new

Jump to Month

  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • July 2019
Product Roadmap
In Review
VEX Support
new
In Progress
Azure integration
new
Container images analysis
new
PHP SAST Suppport
new
Platform redesign
new
CVSS 4.0 in our platform
new
Announcement
a year ago

Get to know this standard we’re applying: ISO/IEC 27001

Every day we work to improve the Security Standards we implement in Fluid Attacks. Today we want to tell you about the standard ISO/IEC 27001 provides requirements for an information security management system (ISMS).

Using them enables organizations of any kind to manage the security of assets such as financial information, intellectual property, employee details, or information entrusted by third parties. The version used in this section is ISO/IEC 27001:2022 - Annex A.

Avatar of authorMaria Fernanda Toro
Announcement
a year ago

Filter Columns in your specific agent execution

In the DevSecOps section, when you select an execution performed by our DevSecOps agent, you will see a pop-up window with details about that execution. In the Summary table, you have Columns filter, which allows you to select the available columns you want to be displayed and which you wish to be hidden in the table.

At Fluid Attacks, we work daily to increase the flexibility and practicality of our platform. Remember that your opinion is important to us. We invite you to comment on this post or email us at help@fluidattacks.com.

Avatar of authorMaria Fernanda Toro
Announcement
a year ago

Get to know more about repositories and branch metrics.

Knowing the number of your repositories plus branches on which our DevSecOps agent has been executed is possible thanks to the Repositories and branches metric on the ARM platform. You can find this information in the Analytics section of your groups. 

If you want to know how to implement the agent in your pipeline, we invite you to access the official documentation. Also, if you want to know more about the Analytics section, you can enter here.

Avatar of authorMaria Fernanda Toro
Announcement
a year ago

Learn more about the standard we’re applying: MVSP

Do you know the standard Minimum Viable Secure Product (MVSP)? It is a cybersecurity checklist baseline that lists controls to ensure minimally viable security posture of a product.


We work daily to improve the Security Standards we implement in Fluid Attacks. Remember, you can find this and other standards we are applying in the Compliance section of our Documentation.

Avatar of authorMaria Fernanda Toro
Announcement
a year ago

How can I install and generate my Token for the Agent?

Do you know that you can include our Agent in your Pipeline to make the verifications before deploying your product to production? In the scope tab of the ARM Platform, there is DevSecOps Agent, where you can generate new tokens or go directly to the documentation and install it.


We would love to hear about your experience with this ARM section: Has the agent been installed in your pipeline? If not yet, we warmly invite you to do so! Utilize this remarkable tool and witness its capabilities. If you have any questions, feel free to leave a comment here or send them to help@fluidattacks.com.

Avatar of authorMaria Fernanda Toro
Announcement
a year ago

Discover our Spanish website!

You can now enjoy the information on our website in Spanish. We aim to ensure that every visitor understands our offer without language barriers. Click on the following link https://fluidattacks.com/es/  and enjoy this new improvement.

Avatar of authorMaria Fernanda Toro
new
a year ago

Add Credentials/Secrets the your AWS Environments.

Great news! You now have the option to add your credentials/secrets to your AWS environment. This will allow us to access your environment and detect any vulnerabilities in your infrastructure. Add them to the Scope -> Git Root -> Environments -> Cloud -> AWS option. 

Don't wait any longer; add your credentials/secrets now and keep your AWS environment safe from potential vulnerabilities. If you want to learn more, visit our official documentation. Stay up-to-date with all our announcements by subscribing to our News channel.

Avatar of authorMaria Fernanda Toro
Announcement
2 years ago

Know what information it gives us your Commitment Towards Security​ Chart

Our DevSecOps agent can break the build to force the remediation of vulnerabilities when strict mode is enabled. Still, when the strict way is disabled, the agent will only generate a warning. You can find a chart named Your commitment towards security, showing the number of builds you have deployed with strict mode enabled and how many are disabled. This can give you an idea of how committed you are to preventing vulnerable builds from reaching production.


This chart is in the Analytics section of your Group. Don’t forget to subscribe to our News channel to stay updated.

Avatar of authorMaria Fernanda Toro
Announcement
2 years ago

Come and see what event types are about!

Do you know the different types of events that can be reported on the ARM platform?  We invite you to access our official documentation, where you can learn about them and thus better understand the events that may take place in your projects. Remember that if you have any questions or feedback, please do not hesitate to contact our support team at help@fluidattacks.com. Also, we want to keep you updated on the features of our ARM platform; that is why we recommend you subscribe to our News channel so that you don’t miss any of our announcements.


Avatar of authorMaria Fernanda Toro
Announcement
2 years ago

Learn more about our policy Temporal acceptance: maximum number of assignments for a single vulnerability

Do you know the Temporal acceptance: maximum number of assignments for a single vulnerability policy? This policy helps us define how many times I can request a temporarily accepted for the same vulnerability.

If you want to know more about the Policies of our ARM Platform, we invite you to click here.  We also invite you to subscribe to our News Channel and do not miss the weekly announcements.

Avatar of authorMaria Fernanda Toro