# Product Security

OpsHub is committed to ensuring that <code class="expression">space.vars.SITENAME</code> is designed, developed, and delivered following industry-standard security practices. Our approach includes secure development practices, application security testing, third-party component monitoring, vulnerability management, and continuous patching of security issues.

Our security practices are aligned with widely accepted standards and frameworks such as OWASP and CWE, and security validation is incorporated throughout the product development lifecycle.

***

## Application Security

OpsHub applies a multi-layered approach to ensure the security of OpsHub Integration Manager.

* Application vulnerability testing is conducted for every release using an industry-leading web application security testing provider.
* Security testing ensures that OpsHub Integration Manager and its deployment environment are protected against external attacks.
* Secure coding practices and validation are implemented in accordance with OWASP guidelines.

Security scans are performed regularly and it is ensured that no high or critical vulnerability exists in the product at the time of release.

***

## Code Security Audits

OpsHub conducts a security audit of the entire code base as part of every release.

The audit includes:

* Analysis for high and critical vulnerabilities
* Coverage of OWASP Top 10 vulnerabilities
* Validation against CWE security guidelines

Any high or critical vulnerabilities identified during the audit are resolved prior to release.

***

## Third-Party Library Security

OpsHub products include certain third-party libraries bundled with the product. These components do not require additional licenses or installation and are monitored as part of our product security program.

***

### Vulnerability Scanning

OpsHub uses **Grype**, a software composition analysis (SCA) tool, to scan builds and container images for vulnerabilities in third-party libraries.

Grype identifies dependencies within software artifacts and compares them against authoritative vulnerability databases to detect known security issues.

***

### Remediation Timeframes

Vulnerabilities identified through scanning are remediated according to the following timelines, measured from the date a fix becomes available in the affected third-party library.

| Severity | Remediation Timeframe |
| -------- | --------------------- |
| Critical | 10 business days      |
| High     | 20 business days      |

***

## Security Reports and Artifacts

For each release, OpsHub publishes security documentation and artifacts to a shared document repository.

These include:

* Software Bill of Materials (SBOM)
* Security scan reports
* False positive reports with documented explanations

All release-related security artifacts are available here:

[Security Reports Repository](https://opshubtrial-my.sharepoint.com/:f:/g/personal/support_opshub_com/IgD2uaOzmshMT7EV7ULZBVSKAeJvTIW5Qs-hY3pzQlP605U?e=CsAdEx)

Each release has a dedicated folder containing the corresponding reports.

***

## Security Issue Patching Policy

OpsHub continuously monitors publicly disclosed vulnerabilities related to core platform components used by the product.

* Security advisories related to Apache Tomcat and Java are actively monitored and patches are applied when required.
* If a severe security issue is reported by a customer or discovered internally by OpsHub, it is patched as soon as reasonably feasible.
