<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing</link><pubDate>Fri, 16 Jan 2026 19:01:58 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Kaushal Patel</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Current Revision posted to Appian Knowledge Base by Kaushal Patel on 1/16/2026 7:01:58 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing and vulnerability scanning as well as&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers, containers and plugin jars. This article outlines accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian reviews security scan results only for recent hotfixes. Customers running older hotfix versions should upgrade to a recent hotfix and resubmit security scan results before Appian team initiates review.&lt;/li&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/0842.Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;&lt;/span&gt;according to the instructions below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate access to the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate modification of the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Inappropriate use of a component of the system or as a whole.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;A description of the risk to the system.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Guidance on how to reach the impacted end point(s).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear steps on how to reproduce the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1588.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: May 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/29</link><pubDate>Wed, 03 May 2023 16:09:33 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 29 posted to Appian Knowledge Base by Elly Meng on 5/3/2023 4:09:33 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing and vulnerability scanning as well as&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers, containers and plugin jars. This article outlines accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/2234.Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;&lt;/span&gt;according to the instructions below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate access to the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate modification of the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Inappropriate use of a component of the system or as a whole.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;A description of the risk to the system.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Guidance on how to reach the impacted end point(s).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear steps on how to reproduce the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: May 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/28</link><pubDate>Wed, 03 May 2023 16:03:11 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 28 posted to Appian Knowledge Base by Elly Meng on 5/3/2023 4:03:11 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing and vulnerability scanning as well as&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers, containers and plugin jars. This article outlines accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/2234.Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;&lt;/span&gt;according to the instructions below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate access to the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate modification of the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Inappropriate use of a component of the system or as a whole.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;A description of the risk to the system.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Guidance on how to reach the impacted end point(s).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear steps on how to reproduce the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: May 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/27</link><pubDate>Wed, 03 May 2023 15:41:48 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 27 posted to Appian Knowledge Base by Elly Meng on 5/3/2023 3:41:48 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing and vulnerability scanning as well as&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers, containers and plugin jars. This article outlines accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/2234.Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;&lt;/span&gt;according to the instructions below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate access to the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate modification of the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Inappropriate use of a component of the system or as a whole.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;A description of the risk to the system.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Guidance on how to reach the impacted end point(s).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear steps on how to reproduce the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case. &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: April 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/26</link><pubDate>Wed, 03 May 2023 15:40:26 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 26 posted to Appian Knowledge Base by Elly Meng on 5/3/2023 3:40:26 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. This article outlines accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/2234.Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;&lt;/span&gt;according to the instructions below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate access to the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate modification of the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Inappropriate use of a component of the system or as a whole.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;A description of the risk to the system.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Guidance on how to reach the impacted end point(s).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear steps on how to reproduce the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case. &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: April 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/25</link><pubDate>Mon, 17 Apr 2023 08:36:50 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Maggie Deppe-Walker</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 25 posted to Appian Knowledge Base by Maggie Deppe-Walker on 4/17/2023 8:36:50 AM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. This article outlines accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/2234.Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;&lt;/span&gt;according to the instructions below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate access to the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate modification of the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Inappropriate use of a component of the system or as a whole.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;A description of the risk to the system.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Guidance on how to reach the impacted end point(s).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear steps on how to reproduce the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case. &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: April 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/24</link><pubDate>Fri, 24 Feb 2023 22:00:10 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 24 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 10:00:10 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. This article outlines accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;according to the instructions below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate access to the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate modification of the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Inappropriate use of a component of the system or as a whole.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;A description of the risk to the system.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Guidance on how to reach the impacted end point(s).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear steps on how to reproduce the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case. &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/23</link><pubDate>Fri, 24 Feb 2023 21:46:18 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 23 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 9:46:18 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. This article outlines accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;according to the instructions below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate access to the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate modification of the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Inappropriate use of a component of the system or as a whole.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;A description of the risk to the system.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Guidance on how to reach the impacted end point(s).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear steps on how to reproduce the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;Appian Support will provide&amp;nbsp;analyses of the report and individual findings through the support case. &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/21</link><pubDate>Fri, 24 Feb 2023 21:22:47 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 21 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 9:22:47 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. This article outlines accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;according to the instructions below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate access to the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate modification of the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Inappropriate use of a component of the system or as a whole.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;A description of the risk to the system.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Guidance on how to reach the impacted end point(s).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear steps on how to reproduce the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/22</link><pubDate>Fri, 24 Feb 2023 21:22:47 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 22 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 9:22:47 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. This article outlines accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;according to the instructions below:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate access to the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate modification of the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Inappropriate use of a component of the system or as a whole.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;A description of the risk to the system.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Guidance on how to reach the impacted end point(s).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear steps on how to reproduce the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/20</link><pubDate>Fri, 24 Feb 2023 21:20:57 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 20 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 9:20:57 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. This article outlines accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;and take note of the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;/span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate access to the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Allowing inappropriate modification of the system or its data.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Inappropriate use of a component of the system or as a whole.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;A description of the risk to the system.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Guidance on how to reach the impacted end point(s).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Clear steps on how to reproduce the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note of the following:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/19</link><pubDate>Fri, 24 Feb 2023 21:17:06 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 19 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 9:17:06 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. This article outlines accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;. &lt;strong&gt;NOTE:&lt;/strong&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;a&lt;/span&gt;ll submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept direct output from automated scanners without additional manual validation.&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note of the following:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/18</link><pubDate>Fri, 24 Feb 2023 21:15:53 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 18 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 9:15:53 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. This article outlines accepted formats for submitting proposed vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;. &lt;strong&gt;NOTE:&lt;/strong&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;a&lt;/span&gt;ll submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept direct output from automated scanners without additional manual validation.&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note of the following:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/17</link><pubDate>Fri, 24 Feb 2023 21:15:14 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 17 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 9:15:14 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. This article outlines accepted formats for submitting proposed vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Appian Vulnerabilities&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;. &lt;strong&gt;NOTE:&lt;/strong&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;a&lt;/span&gt;ll submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept direct output from automated scanners without additional manual validation.&lt;/p&gt;
&lt;h4&gt;Appian Third-Party Component Vulnerabilities&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note of the following:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/16</link><pubDate>Fri, 24 Feb 2023 21:14:32 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 16 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 9:14:32 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. This article outlines accepted formats for submitting proposed vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Appian Vulnerabilities&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note that &lt;strong&gt;a&lt;/strong&gt;&lt;/span&gt;&lt;b&gt;ll submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/p&gt;
&lt;h4&gt;Appian Third-Party Component Vulnerabilities&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note of the following:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/15</link><pubDate>Fri, 24 Feb 2023 17:40:29 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 15 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 5:40:29 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. This article outlines accepted formats for submitting proposed vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note that &lt;strong&gt;a&lt;/strong&gt;&lt;/span&gt;&lt;b&gt;ll submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note of the following:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/14</link><pubDate>Fri, 24 Feb 2023 17:35:14 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 14 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 5:35:14 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. This article outlines accepted formats for submitting proposed vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note that &lt;strong&gt;a&lt;/strong&gt;&lt;/span&gt;&lt;b&gt;ll submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note of the following:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/13</link><pubDate>Fri, 24 Feb 2023 17:29:30 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 13 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 5:29:30 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. Any proposed vulnerabilities submitted to Appian must be done via support case in the following formats:&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;All submissions must adhere to the following:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided template.&lt;/li&gt;
&lt;li&gt;All&amp;nbsp;vulnerability documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note that &lt;strong&gt;a&lt;/strong&gt;&lt;/span&gt;&lt;b&gt;ll submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/p&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note of the following:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/12</link><pubDate>Fri, 24 Feb 2023 17:28:18 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 12 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 5:28:18 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. Any proposed vulnerabilities submitted to Appian must be done via support case in the following formats:&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;All submissions must adhere to the following:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided template.&lt;/li&gt;
&lt;li&gt;All&amp;nbsp;vulnerability documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note that &lt;strong&gt;a&lt;/strong&gt;&lt;/span&gt;&lt;b&gt;ll submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note of the following:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/11</link><pubDate>Fri, 24 Feb 2023 17:28:01 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 11 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 5:28:01 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. Any proposed vulnerabilities submitted to Appian must be done via support case in the following formats:&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;All submissions must adhere to the following:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided template.&lt;/li&gt;
&lt;li&gt;All&amp;nbsp;vulnerability documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;span style="font-weight:400;"&gt;Appian Vulnerabilities&lt;/span&gt;&lt;/h4&gt;
&lt;p&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note that &lt;strong&gt;a&lt;/strong&gt;&lt;/span&gt;&lt;b&gt;ll submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Appian Third-Party Component Vulnerabilities&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note of the following:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item><item><title>KB-KB-2233 Appian Self-Managed Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing/revision/10</link><pubDate>Fri, 24 Feb 2023 17:27:21 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:5f7ad94d-fcba-4c5c-abe7-9f9222307796</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/3085/kb-2233-appian-self-managed-vulnerability-testing#comments</comments><description>Revision 10 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 5:27:21 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Self-managed customers can perform security-related activities against their Appian&amp;nbsp;installation&amp;nbsp;such as penetration testing, vulnerability scanning and&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers or containers. Any proposed vulnerabilities submitted to Appian must be done via support case in the following formats:&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Submitting Results&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;All submissions must adhere to the following:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided template.&lt;/li&gt;
&lt;li&gt;All&amp;nbsp;vulnerability documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Appian Vulnerabilities&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/8284.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;&lt;span style="font-weight:400;"&gt;Appian vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note that &lt;strong&gt;a&lt;/strong&gt;&lt;/span&gt;&lt;b&gt;ll submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept direct output from automated scanners without additional manual validation.&lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span style="font-weight:400;"&gt;Appian Third-Party Component Vulnerabilities&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;This section is applicable to Software Composition Analysis scans against Appian installers or containers.&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the &lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-13/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;and take note of the following:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Version&amp;nbsp;(major and hotfix) must be provided.&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Self-managed&amp;nbsp;vs. leveraging Appian on Kubernetes must be specified.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="list-style-type:none;"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;What to Expect Next&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all self-managed versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: February 2023&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security&lt;/div&gt;
</description></item></channel></rss>