Create policies
Last updated
Last updated
More information
Snyk privacy policy© 2024 Snyk Limited | All product and company names and logos are trademarks of their respective owners.
Snyk AppRisk includes a powerful policy editor for creating and modifying policies.
There are two steps to building policies:
Define filters - Set filter conditions on asset properties.
Set actions - Define actions to be taken on filtered assets.
You can create a new policy using the Start from scratch option or choose one of the available policy templates using the Use a template option.
To create a new policy, you have to click the New Policy option from the Policies/Assets view and select the Start from scratch option.
You must name your policy and, optionally, provide a description of the policy. After you complete these steps you have to define the filters and set the actions of your policy.
You can create a new policy by using one of the available templates. To select one of the policy templates, you have to click the New Policy option from the Policies/Assets view and select the Use a template option. You can select one of the templates from the templates library by clicking the Use template button from the policy template card.
Each policy template has a name, a description, and displays the graphic connections between filters and actions.
The following video explains how to use a policy template from the Policies view:
You can customize the filters and actions or use the template as is. After finishing all the template changes, click the Save button to create the new policy.
Release status
The risk factors on assets are taking the release status of the applied risk factor.
The Runtime discovered and Runtime last seen filters are taking the release status of the used runtime integration.
Each filter component requires you to specify an asset property. Navigate to the Filters capabilities page to view all available properties for asset policies.
The following video explains how to create a new policy:
Each property contains different options for conditions and values:
Property | Conditions Values | Values |
---|---|---|
Application* |
| all available applications for which you have configured the application context in Snyk AppRisk. |
Asset ID |
| [string] |
Asset name |
| [string] |
Asset type |
|
|
Attribute |
| [string] |
Catalog name* |
| the list of names of your application context. |
Category |
| the list of the available categories of a repository asset |
Class |
| A, B, C, D |
Coverage |
| Snyk Code, Container, IaC, Open Source |
Coverage gap |
| Snyk Code, Container, IaC, Open Source |
Developers |
| [string] |
Discovered |
|
|
Issue severity |
|
|
Issue source |
| Snyk Code, Container, IaC, Open Source, Nightfall |
Last seen |
|
|
Lifecycle* |
| the available list of the lifecycle states of the application context component |
Locked attributes |
|
|
Owner* |
| the list of teams owning the repository for which the application context was configured. |
Risk factors |
| the list of available risk factors |
Runtime discovered |
|
|
Runtime last seen |
|
|
SCM Repository freshness |
|
|
Source |
|
|
Tags |
| all available tags you previously created |
Title* |
| the list with all the names of the component for which the application context was configured |
*All filters marked with *
are visible only to the users who configured the application context for their SCM integrations.
You can specify more than one filter component with an And or Or operator.
The following video explains the use of filters and the use of the And, Or operator.
After defining filter components, you need to define the actions that the policy has to perform on the filtered assets. Asset policies support the following actions:
Send Email - Receive an email every time there are asset updates. You can choose between daily emails or scheduling the checks. You can include a link to the relevant assets. Each notification lists all impacted assets. You can view them individually or see the aggregated view by clicking Click Here. The list of assets displayed in the email notification is automatically generated.
Send Slack Message - Receive a Slack notification every time there are asset updates. You need to add your Slack webhook URL, then you can choose between daily emails or scheduling the checks. You can include a link to the relevant assets. Each notification lists all impacted assets. You can view them individually or see the aggregated view by clicking Click Here. The list of assets displayed in the email notification is automatically generated.
Set Asset Class - Sets the class on the matched assets. Removing the policy or turning in off does not retroactively change the asset class back to default.
Set Asset Tag - Sets a tag on the matched assets. Removing the policy or turning in off will remove the tags of this policy from the relevant assets.
Set Coverage Control Policy - Sets a control on filtered assets that checks whether selected security products are scanning assets, optionally within a given timeframe. Assets that fail this control will be marked accordingly on inventory pages. This control applies the OR logic across products.
Set Jira policy - Automate the creation and management of Jira tickets based on specific conditions related to your assets. You can create new Jira tickets for new matches that meet the policy criteria, modify existing Jira tickets if the policy conditions change, set classifications and tags on assets using the policy, or notify users using Slack or email when a condition is met.
The editor supports multiple flows for the same policy. The flows can be independent or intersect.