DefectDojo

efecDefectDojo is an application security orchestration and vulnerability management platform that provides centralized tracking and workflow automation for security findings.

Use Cases the Adapter Solves

  • Security Vulnerability Visibility: Track and monitor security vulnerabilities across your application portfolio by correlating DefectDojo findings with assets discovered by Axonius.
  • Application Security Compliance: Ensure applications meet security standards by identifying which products have open security findings and require remediation.

Asset Types Fetched

  • Application Services

Data Retrieved through the Adapter

Application Services - Fetches fields such as Product Name, Product ID, Product Type, Software CVEs (including CVE ID, CWE ID, Severity, Description, Mitigation, Active Status)

Before You Begin

Required Ports

  • TCP port 443 (HTTPS) or TCP port 80 (HTTP) depending on your DefectDojo instance configuration

Authentication Methods

API Token Authentication

APIs

Axonius uses the DefectDojo API v2. The following endpoints are called:

  • GET /api/v2/products/
  • GET /api/v2/findings/

Required Permissions

The DefectDojo user account must have at least Reader role permissions on the Products and Findings you want to retrieve.

Note: Users with Reader, Writer, Maintainer, Owner roles, or Global Roles can access the API. For detailed information about DefectDojo roles and permissions, refer to the DefectDojo User Permissions Documentation.

Supported From Version

Supported from Axonius version 8.0.22

Connecting the Adapter in Axonius

Navigate to the Adapters page, search for DefectDojo, and click on the adapter tile.

Click Add Connection.

To connect the adapter in Axonius, provide the following parameters:

Required Parameters

  1. Host Name or IP Address - The base URL of your DefectDojo instance. Example: https://defectdojo.example.com
  2. API Token - The API token generated from DefectDojo. Provide only the token value without the "Token" prefix.
DefectDojo image

Optional Parameters

  1. Verify SSL - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.
  2. HTTPS Proxy - Connect the adapter to a proxy instead of directly connecting it to the domain.
  3. HTTPS Proxy User Name - The user name to use when connecting to the value supplied in Host Name or IP Address via the value supplied in HTTPS Proxy.
  4. HTTPS Proxy Password - The password to use when connecting to the server using the HTTPS Proxy.

To learn more about common adapter connection parameters and buttons, see Adding a New Adapter Connection.