Skip to content

DAST with Bamboo CI (Dynamic Application Security Testing)

Integrate AccuKnox DAST with Bamboo CI/CD to automate vulnerability scans for your web applications. Scan results are sent to AccuKnox CSPM for centralized visibility, compliance, and remediation.

alt text

Prerequisites

Before you begin

Ensure you have the following prerequisites ready before starting the integration:

  1. Bamboo Access - Permission to create and configure build plans, and manage global variables.

  2. AccuKnox UI Access - Access to the AccuKnox platform.

  3. AccuKnox Scan API Credentials - You will need the following details:

  4. Repository Access - Ensure Bamboo can perform a full clone of your source code repository during the build process.

  5. Global Variables - Defined global variables for endpoint, token, label, and softfail (including additional variables as required).

Configuration Steps

Step 1: Define Global Variables

Navigate to Bamboo Administration → Global Variables and add the following:

Variable Name Description Example
ACCUKNOX_ENDPOINT URL of the AccuKnox CSPM panel cspm.demo.accuknox.com
ACCUKNOX_TOKEN Authentication token for AccuKnox API your_api_token_here
ACCUKNOX_LABEL Label to tag scan results bamboo-dast
SOFT_FAIL Optional flag to allow pipeline continuation on failure true

Step 2: Add a DAST Scan Stage to Your Build Pipeline

In your Bamboo plan, add a Script Task. You can use the shell script below or the YAML configuration.

Script Task
#!/bin/sh -e
export SOFT_FAIL="true"
export ACCUKNOX_ENDPOINT="${bamboo.ACCUKNOX_ENDPOINT}"
export ACCUKNOX_TOKEN="${bamboo.ACCUKNOX_TOKEN}"
export ACCUKNOX_LABEL="${bamboo.ACCUKNOX_LABEL}"
export IMAGE="test"
export IMAGE_TAG="latest"
export SEVERITY="CRITICAL,HIGH,WARNING,MEDIUM,LOW,INFO"

# ASPM Scanner Installation
wget -q https://github.com/accuknox/aspm-scanner-cli/releases/download/v0.13.8/accuknox-aspm-scanner -O accuknox-aspm-scanner
chmod +x accuknox-aspm-scanner

# Determine soft-fail arg
if [ "${SOFT_FAIL}" = "true" ]; then
    softFailArg="--softfail"
else
    softFailArg=""
fi

TARGET_URL="https://juice-shop.herokuapp.com/"
DAST_SCRIPT="zap-baseline.py"
SEVERITY_THRESHOLD="High"

mkdir -p /tmp/dast-run
chmod 777 /tmp/dast-run
cd /tmp/dast-run

dast_cmd="${DAST_SCRIPT} -t ${TARGET_URL} -I"

# Initiating DAST Scan
dastScan="accuknox-aspm-scanner scan $softFailArg dast --command \"$dast_cmd\" --container-mode --severity-threshold $SEVERITY_THRESHOLD"
echo "Running: $dastScan"
eval "$dastScan"
bamboo-specs.yaml
- script:
    interpreter: SHELL
    scripts:
      - |-
        #!/bin/sh -e
        export SOFT_FAIL="true"
        export ACCUKNOX_ENDPOINT="${bamboo.ACCUKNOX_ENDPOINT}"
        export ACCUKNOX_TOKEN="${bamboo.ACCUKNOX_TOKEN}"
        export ACCUKNOX_LABEL="${bamboo.ACCUKNOX_LABEL}"
        export IMAGE="test"
        export IMAGE_TAG="latest"
        export SEVERITY="CRITICAL,HIGH,WARNING,MEDIUM,LOW,INFO"

        # ASPM Scanner Installation
        wget -q https://github.com/accuknox/aspm-scanner-cli/releases/download/v0.13.8/accuknox-aspm-scanner -O accuknox-aspm-scanner
        chmod +x accuknox-aspm-scanner

        # Determine soft-fail arg
        if [ "${SOFT_FAIL}" = "true" ]; then
            softFailArg="--softfail"
        else
            softFailArg=""
        fi

        TARGET_URL="https://juice-shop.herokuapp.com/"
        DAST_SCRIPT="zap-baseline.py"
        SEVERITY_THRESHOLD="High"

        mkdir -p /tmp/dast-run
        chmod 777 /tmp/dast-run
        cd /tmp/dast-run

        dast_cmd="${DAST_SCRIPT} -t ${TARGET_URL} -I"

        # Initiating DAST Scan
        dastScan="accuknox-aspm-scanner scan $softFailArg dast --command \"$dast_cmd\" --container-mode --severity-threshold $SEVERITY_THRESHOLD"
        echo "Running: $dastScan"
        eval "$dastScan"
    description: DAST Scan Script
    artifact-subscriptions: []

Note

  • Set SOFT_FAIL=false to enforce strict build blocking when vulnerabilities are found.
  • Modify TARGET_URL to point to your staging or production URL as needed.

Workflow Comparison

Workflow Execution Without AccuKnox

  • DAST scans must be manually executed
  • Results are not centralised or correlated with risk posture

Workflow Execution With AccuKnox

Integrating AccuKnox DAST with Bamboo CI ensures:

  • DAST scans are automatically triggered as part of your Bamboo pipeline
  • Findings are pushed to the AccuKnox platform
  • Vulnerabilities are mapped to frameworks such as OWASP Top 10 or PCI DSS for compliance tracking

Viewing Results in AccuKnox

Why Integrate AccuKnox DAST with Bamboo CI?

  • Continuous security testing of web applications during the CI/CD process
  • Automatic synchronisation of findings with the AccuKnox platform
  • Real-time visibility of OWASP Top 10 vulnerabilities
  • Centralised remediation and compliance reporting
  1. After the pipeline run, log in to AccuKnox.

  2. Navigate to AccuKnox → Issues → Findings, and select DAST Findings.

    alt text

    DAST Findings Dashboard - Filtered by Label 'SPOC'

  3. Click any finding to view more details.

    alt text

  4. Use the Create Ticket button to raise a ticket directly from the finding.

Need Help?

Let us know if you are seeking additional guidance in planning your cloud security program.