Security

Rules

Security Rules define automated logic and checks across code, cloud, applications, and binaries. They provide a structured approach to identifying vulnerabilities, strengthening secure development practices, and aligning with compliance and risk-management standards.

Total rules

16

Targets covered

1

Mapped standards

6

Technique DAST

0.5

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

2.1

Low

Target: SSL

Technology: CERTIFICATE

CWE ID(s):

CWE-297

Last update time: Dec 1, 2025

0.5

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Jan 21, 2026

0.6

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-326

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: CERTIFICATE

CWE ID(s):

CWE-298

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: CERTIFICATE

CWE ID(s):

CWE-296

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

0.5

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

0.5

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

0.5

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

2.7

Low

Target: SSL

Technology: CERTIFICATE

CWE ID(s):

CWE-299

Last update time: Apr 23, 2026

0.6

Low

Target: SSL

Technology: CERTIFICATE

CWE ID(s):

CWE-297

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025