<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-1447 Appian Cloud Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-1447 Appian Cloud Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing</link><pubDate>Tue, 14 Apr 2026 15:29:27 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Kaushal Patel</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Current Revision posted to Appian Knowledge Base by Kaushal Patel on 4/14/2026 3:29:27 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Cloud customers can perform security-related activities against their Appian environments such as penetration testing and vulnerability scanning as well as&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers, containers and plugin jars. This article outlines assessment rules and accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Appian Cloud Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 US business days&lt;/strong&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;(Mon-Fri 9:00 AM to 6:00 PM EST/EDT)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian reviews security scan results only for recent hotfixes. Customers running older hotfix versions should upgrade to a recent hotfix and resubmit security scan results before Appian team initiates review.&lt;/li&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Appian Vulnerabilities&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/3683.Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;according&amp;nbsp;the instructions below:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept invalidated results or direct output from automated scanners without additional manual validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Appian Third-Party Component Vulnerabilities&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/6371.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud&lt;/p&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;April 2026&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Appian Cloud Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/33</link><pubDate>Fri, 16 Jan 2026 18:17:42 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Kaushal Patel</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 33 posted to Appian Knowledge Base by Kaushal Patel on 1/16/2026 6:17:42 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Cloud customers can perform security-related activities against their Appian environments such as penetration testing and vulnerability scanning as well as&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers, containers and plugin jars. This article outlines assessment rules and accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Appian Cloud Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Appian reviews security scan results only for recent hotfixes. Customers running older hotfix versions should upgrade to a recent hotfix and resubmit security scan results before Appian team initiates review.&lt;/li&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Appian Vulnerabilities&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1680.Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;according&amp;nbsp;the instructions below:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Appian Third-Party Component Vulnerabilities&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/4718.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud&lt;/p&gt;
&lt;p&gt;Last Reviewed: May 2023&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Appian Cloud Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/32</link><pubDate>Wed, 04 Dec 2024 23:22:25 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Maggie Deppe-Walker</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 32 posted to Appian Knowledge Base by Maggie Deppe-Walker on 12/4/2024 11:22:25 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Cloud customers can perform security-related activities against their Appian environments such as penetration testing and vulnerability scanning as well as&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers, containers and plugin jars. This article outlines assessment rules and accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Appian Cloud Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Appian Vulnerabilities&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;according&amp;nbsp;the instructions below:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Appian Third-Party Component Vulnerabilities&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud&lt;/p&gt;
&lt;p&gt;Last Reviewed: May 2023&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Appian Cloud Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/31</link><pubDate>Wed, 28 Aug 2024 19:27:25 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 31 posted to Appian Knowledge Base by pauline.delacruz on 8/28/2024 7:27:25 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Cloud customers can perform security-related activities against their Appian environments such as penetration testing and vulnerability scanning as well as&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers, containers and plugin jars. This article outlines assessment rules and accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Appian Cloud Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;according&amp;nbsp;the instructions below:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud&lt;/p&gt;
&lt;p&gt;Last Reviewed: May 2023&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Appian Cloud Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/30</link><pubDate>Mon, 19 Aug 2024 20:53:59 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 30 posted to Appian Knowledge Base by pauline.delacruz on 8/19/2024 8:53:59 PM&lt;br /&gt;
&lt;h2&gt;&lt;span&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Cloud customers can perform security-related activities against their Appian environments such as penetration testing and vulnerability scanning as well as&amp;nbsp;&lt;/span&gt;&lt;span&gt;software composition analysis scans on installers, containers and plugin jars. This article outlines assessment rules and accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Appian Cloud Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong data-renderer-mark="true"&gt;&amp;nbsp;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case if no third party is involved in any phase of the testing or the tool used for scanning is not sending any information to a third party. If a third party is involved in any phase of the testing or the tool used for testing is sending any information to a third party, customers must submit the support case at least&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;10 business days&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;prior to testing along with a completed NDA.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/5584.Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;according&amp;nbsp;the instructions below:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Fill out the&amp;nbsp;&lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/3817.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span&gt;according to the instructions below:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud&lt;/p&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;August&amp;nbsp;2024&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Appian Cloud Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/29</link><pubDate>Wed, 03 May 2023 16:09:44 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 29 posted to Appian Knowledge Base by Elly Meng on 5/3/2023 4:09:44 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Cloud customers can perform security-related activities against their Appian environments such as penetration testing and vulnerability scanning as well as&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers, containers and plugin jars. This article outlines assessment rules and accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Appian Cloud Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;according&amp;nbsp;the instructions below:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud&lt;/p&gt;
&lt;p&gt;Last Reviewed: May 2023&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Appian Cloud Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/28</link><pubDate>Wed, 03 May 2023 16:08:40 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 28 posted to Appian Knowledge Base by Elly Meng on 5/3/2023 4:08:40 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Cloud customers can perform security-related activities against their Appian environments such as penetration testing and vulnerability scanning as well as&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers, containers and plugin jars. This article outlines assessment rules and accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Appian Cloud Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;according&amp;nbsp;the instructions below:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional manual validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud&lt;/p&gt;
&lt;p&gt;Last Reviewed: May 2023&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Appian Cloud Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/27</link><pubDate>Wed, 03 May 2023 16:07:44 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 27 posted to Appian Knowledge Base by Elly Meng on 5/3/2023 4:07:44 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Cloud customers can perform security-related activities against their Appian environments such as penetration testing and vulnerability scanning as well as&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers, containers and plugin jars. This article outlines assessment rules and accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Appian Cloud Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;as per the instructions below:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud&lt;/p&gt;
&lt;p&gt;Last Reviewed: May 2023&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Appian Cloud Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/26</link><pubDate>Wed, 03 May 2023 16:05:23 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 26 posted to Appian Knowledge Base by Elly Meng on 5/3/2023 4:05:23 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Cloud customers can perform security-related activities against their Appian environments such as penetration testing and vulnerability scanning as well as&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;software composition analysis scans on installers, containers and plugin jars. This article outlines assessment rules and accepted formats for submitting vulnerabilities to Appian.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Appian Cloud Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;as per the instructions below:&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud&lt;/p&gt;
&lt;p&gt;Last Reviewed: May 2023&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Appian Cloud Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/25</link><pubDate>Wed, 03 May 2023 16:03:17 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 25 posted to Appian Knowledge Base by Elly Meng on 5/3/2023 4:03:17 PM&lt;br /&gt;
&lt;p&gt;The following rules apply to all scanning activity, penetration testing, or other vulnerability assessment performed against Appian Cloud sites or the Appian platform:&lt;/p&gt;
&lt;h3&gt;Appian Cloud Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following applies to all submissions:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All documentation (including results, summaries, and reproduction steps) must be submitted in English.&lt;/li&gt;
&lt;li&gt;Appian will not accept findings that are missing information within the provided templates.&lt;/li&gt;
&lt;li&gt;Submissions&amp;nbsp;much be done via support case.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to penetration testing or vulnerability scans against&amp;nbsp;Appian installations.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;as per the instructions below:&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;&lt;strong&gt;Appian Third-Party Component Vulnerabilities&lt;/strong&gt;&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;This section is applicable to Software Composition Analysis scans against Appian installers, containers and plugin jars.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Fill out the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/1581.Appian_5F00_Third_5F00_Party_5F00_Library_5F00_Vulnerability_5F00_Template_5F00_1.0.xlsx"&gt;&lt;span style="font-weight:400;"&gt;Appian third-party vulnerability submission worksheet&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;&lt;span&gt;according to the instructions below&lt;/span&gt;:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;If the vulnerability reporting source is vendor specific (ex: BlackDuck or X-Ray), the customer&amp;nbsp;should provide as much&amp;nbsp;explanatory detail as possible in the Description column in order for Appian to effectively validate the issue.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Appian will review the findings (assuming all submission requirements have been met) and either accept or reject&amp;nbsp;each one.&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability was rejected (false positive, configuration-level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud&lt;/p&gt;
&lt;p&gt;Last Reviewed: May 2023&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Appian Cloud Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/24</link><pubDate>Mon, 17 Apr 2023 08:34:29 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Maggie Deppe-Walker</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 24 posted to Appian Knowledge Base by Maggie Deppe-Walker on 4/17/2023 8:34:29 AM&lt;br /&gt;
&lt;p&gt;The following rules apply to all scanning activity, penetration testing, or other vulnerability assessment performed against Appian Cloud sites or the Appian platform:&lt;/p&gt;
&lt;h3&gt;Appian Cloud Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/Appian-Vulnerability-Submission-Worksheet.docx"&gt;Appian Vulnerability Submission Worksheet&lt;/a&gt;&amp;nbsp;as per the instructions below:&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;Validated vulnerabilities should be submitted to Appian Support via a support ticket.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;All vulnerability documentation (including results, summaries, and steps) must be submitted in English.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Appian will review the findings (assuming all submission requirements have been met) and accept or reject the individual findings.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability has been rejected (false-positive, configuration level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2023&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Appian Cloud Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/23</link><pubDate>Fri, 24 Feb 2023 22:10:31 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 23 posted to Appian Knowledge Base by Elly Meng on 2/24/2023 10:10:31 PM&lt;br /&gt;
&lt;p&gt;The following rules apply to all scanning activity, penetration testing, or other vulnerability assessment performed against Appian Cloud sites or the Appian platform:&lt;/p&gt;
&lt;h3&gt;Appian Cloud Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/8105.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;Appian vulnerability submission worksheet&lt;/a&gt;&amp;nbsp;as per the instructions below:&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;Validated vulnerabilities should be submitted to Appian Support via a support ticket.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;All vulnerability documentation (including results, summaries, and steps) must be submitted in English.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Appian will review the findings (assuming all submission requirements have been met) and accept or reject the individual findings.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability has been rejected (false-positive, configuration level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;Appian Support will provide&amp;nbsp;analyses and impact assessments of the report and individual findings through the support case.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud&lt;/p&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;February 2023&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Appian Cloud Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/22</link><pubDate>Tue, 21 Feb 2023 18:43:52 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 22 posted to Appian Knowledge Base by Elly Meng on 2/21/2023 6:43:52 PM&lt;br /&gt;
&lt;p&gt;The following rules apply to all scanning activity, penetration testing, or other vulnerability assessment performed against Appian Cloud sites or the Appian platform:&lt;/p&gt;
&lt;h3&gt;Appian Cloud Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/8105.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;Appian vulnerability submission worksheet&lt;/a&gt;&amp;nbsp;as per the instructions below:&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;Validated vulnerabilities should be submitted to Appian Support via a support ticket.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;All vulnerability documentation (including results, summaries, and steps) must be submitted in English.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Appian will review the findings (assuming all submission requirements have been met) and accept or reject the individual findings.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability has been rejected (false-positive, configuration level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian Support will provide analysis and assessment of the report and individual findings through the support case.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud&lt;/p&gt;
&lt;p&gt;Last Reviewed:&amp;nbsp;February 2023&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/21</link><pubDate>Thu, 22 Sep 2022 20:56:44 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 21 posted to Appian Knowledge Base by Elly Meng on 9/22/2022 8:56:44 PM&lt;br /&gt;
&lt;p&gt;The following rules apply to all scanning activity, penetration testing, or other vulnerability assessment performed against Appian Cloud sites or the Appian platform:&lt;/p&gt;
&lt;h3&gt;Assessment Rules (Appian Cloud only)&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/8105.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;Appian vulnerability submission worksheet&lt;/a&gt;&amp;nbsp;as per the instructions below:&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;Validated vulnerabilities should be submitted to Appian Support via a support ticket.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;All vulnerability documentation (including results, summaries, and steps) must be submitted in English.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Appian will review the findings (assuming all submission requirements have been met) and accept or reject the individual findings.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability has been rejected (false-positive, configuration level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian Support will provide analysis and assessment of the report and individual findings through the support case.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian.&lt;/p&gt;
&lt;p&gt;Last Reviewed: September 2022&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: self-managed, Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/20</link><pubDate>Tue, 19 Apr 2022 18:15:15 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Elly Meng</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 20 posted to Appian Knowledge Base by Elly Meng on 4/19/2022 6:15:15 PM&lt;br /&gt;
&lt;p&gt;The following rules apply to all scanning activity, penetration testing, or other vulnerability assessment performed against Appian Cloud sites or the Appian platform:&lt;/p&gt;
&lt;h3&gt;Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian considers any information identified during a security test of an Appian Cloud site to be Confidential Information that is protected under Appian&amp;rsquo;s contractual agreements with its customers. This obligation to protect Appian&amp;rsquo;s Confidential Information must flow down to any third-party security consultants hired by Appian customers. Please indicate in the support case whether a third-party entity will be used for security testing and whether the third-party entity has executed a non-disclosure agreement appropriate for the purpose.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/8105.AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;Appian vulnerability submission worksheet&lt;/a&gt;&amp;nbsp;as per the instructions below:&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;Validated vulnerabilities should be submitted to Appian Support via a support ticket.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;All vulnerability documentation (including results, summaries, and steps) must be submitted in English.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Appian will review the findings (assuming all submission requirements have been met) and accept or reject the individual findings.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability has been rejected (false-positive, configuration level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian Support will provide analysis and assessment of the report and individual findings through the support case.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud.&lt;/p&gt;
&lt;p&gt;Last Reviewed: April 2022&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/19</link><pubDate>Fri, 14 May 2021 23:33:25 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Nicholas Van Dyke</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 19 posted to Appian Knowledge Base by Nicholas Van Dyke on 5/14/2021 11:33:25 PM&lt;br /&gt;
&lt;p&gt;The following rules apply to all scanning activity, penetration testing, or other vulnerability assessment performed against Appian Cloud sites or the Appian platform:&lt;/p&gt;
&lt;h3&gt;Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Fill out the&amp;nbsp;&lt;a href="/cfs-file/__key/communityserver-wikis-components-files/00-00-00-00-11/AppianCloud_5F00_Worksheet_5F00_VulnerabilitySubmission.docx"&gt;Appian vulnerability submission worksheet&lt;/a&gt;&amp;nbsp;as per the instructions below:&amp;nbsp;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Appian requires verifiable evidence such as screenshots, payloads, or any other associated proof-of-concept material as well as manual reproduction steps in order to properly validate any reported vulnerability findings.&lt;/li&gt;
&lt;li&gt;Validated vulnerabilities should be submitted to Appian Support via a support ticket.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;All vulnerability documentation (including results, summaries, and steps) must be submitted in English.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Appian will review the findings (assuming all submission requirements have been met) and accept or reject the individual findings.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability has been rejected (false-positive, configuration level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian Support will provide analysis and assessment of the report and individual findings through the support case.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud.&lt;/p&gt;
&lt;p&gt;Last Reviewed: May 2021&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/18</link><pubDate>Sun, 02 Aug 2020 22:50:18 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 18 posted to Appian Knowledge Base by Parmida Borhani on 8/2/2020 10:50:18 PM&lt;br /&gt;
&lt;p&gt;The following rules apply to all scanning activity, penetration testing, or other vulnerability assessment performed against Appian Cloud sites or the Appian platform:&lt;/p&gt;
&lt;h3&gt;Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Validation requires that the assessor has reviewed the issues to remove false positives, and is able to reproduce any issues and prove to Appian that they can be used to exploit the system.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Validated vulnerabilities should be submitted to Appian Support via a support ticket.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;All vulnerability documentation (including results, summaries, and steps) must be submitted in English.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Appian will review the findings (assuming all submission requirements have been met) and accept or reject the individual findings.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability has been rejected (false-positive, configuration level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian Support will provide analysis and assessment of the report and individual findings through the support case.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud.&lt;/p&gt;
&lt;p&gt;Last Reviewed: August 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/17</link><pubDate>Fri, 10 Jul 2020 05:49:37 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 17 posted to Appian Knowledge Base by Parmida Borhani on 7/10/2020 5:49:37 AM&lt;br /&gt;
&lt;p&gt;The following rules apply to all scanning activity, penetration testing, or other vulnerability assessment performed against Appian Cloud sites or the Appian platform:&lt;/p&gt;
&lt;h3&gt;Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Validation requires that the assessor has reviewed the issues to remove false positives, and is able to reproduce any issues and prove to Appian that they can be used to exploit the system.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Validated vulnerabilities should be submitted to Appian Support via a support ticket.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;All vulnerability documentation (including results, summaries, and steps) must be submitted in English.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Appian will review the findings (assuming all submission requirements have been met) and accept or reject the individual findings.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability has been rejected (false-positive, configuration level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian Support will provide analysis and assessment of the report and individual findings through the support case.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian will make a best effort to address accepted vulnerabilities in accordance with industry standards below based on the severity classifications of the findings:&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="content-scrollable-wrapper"&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Severity&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;LOW&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;MEDIUM&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;HIGH&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;CRITICAL&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;SLA&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;90 days&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;45 days&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;ASAP/max 5 days&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;ASAP/max 5 days&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud.&lt;/p&gt;
&lt;p&gt;Last Reviewed: July 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/16</link><pubDate>Fri, 10 Jul 2020 05:49:07 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 16 posted to Appian Knowledge Base by Parmida Borhani on 7/10/2020 5:49:07 AM&lt;br /&gt;
&lt;p&gt;The following rules apply to all scanning activity, penetration testing, or other vulnerability assessment performed against Appian Cloud sites or the Appian platform:&lt;/p&gt;
&lt;h3&gt;Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Validation requires that the assessor has reviewed the issues to remove false positives, and is able to reproduce any issues and prove to Appian that they can be used to exploit the system.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Validated vulnerabilities should be submitted to Appian Support via a support ticket.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;All vulnerability documentation (including results, summaries, and steps) must be submitted in English.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;What to Expect Next&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;Appian will review the findings (assuming all submission requirements have been met) and accept or reject the individual findings.&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;For rejected findings, Appian will provide an explanation as to why the reported vulnerability has been rejected (false-positive, configuration level controls available to mitigate, etc.).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian Support will provide analysis and assessment of the report and individual findings through the Support Case.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Appian will make a best effort to address accepted vulnerabilities in accordance with industry standards below based on the severity classifications of the findings:&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="content-scrollable-wrapper"&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Severity&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;LOW&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;MEDIUM&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;HIGH&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;CRITICAL&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;SLA&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;90 days&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;45 days&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;ASAP/max 5 days&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span&gt;ASAP/max 5 days&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud.&lt;/p&gt;
&lt;p&gt;Last Reviewed: July 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/15</link><pubDate>Wed, 01 Jul 2020 22:23:17 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>James Lee</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 15 posted to Appian Knowledge Base by James Lee on 7/1/2020 10:23:17 PM&lt;br /&gt;
&lt;p&gt;The following rules apply to all scanning activity, penetration testing, or other vulnerability assessment performed against Appian Cloud sites or the Appian platform:&lt;/p&gt;
&lt;h3&gt;Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt; 3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Validation requires that the assessor has reviewed the issues to remove false positives, and is able to reproduce any issues and prove to Appian that they can be used to exploit the system.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Validated vulnerabilities should be submitted to Appian Support via a support ticket.&lt;/li&gt;
&lt;li&gt;&lt;span&gt;All vulnerability documentation (including results, summaries, and steps) must be submitted in English.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud.&lt;/p&gt;
&lt;p&gt;Last Reviewed: July 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item><item><title>KB-1447 Vulnerability Testing</title><link>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing/revision/14</link><pubDate>Thu, 18 Jun 2020 20:00:49 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:99d81c09-22a3-4960-bd27-956b147956c1</guid><dc:creator>Rebecca Jonas</dc:creator><comments>https://community.appian.com/support/w/kb/762/kb-1447-appian-cloud-vulnerability-testing#comments</comments><description>Revision 14 posted to Appian Knowledge Base by Rebecca Jonas on 6/18/2020 8:00:49 PM&lt;br /&gt;
&lt;p&gt;The following rules apply to all scanning activity, penetration testing, or other vulnerability assessment performed against Appian Cloud sites or the Appian platform:&lt;/p&gt;
&lt;h3&gt;Assessment Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;All planned security testing by customers must be submitted to Appian Technical Support at least&lt;strong&gt; 3 business days&lt;/strong&gt;&amp;nbsp;prior to testing via a support case.&lt;/li&gt;
&lt;li&gt;The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;li&gt;Start time of test (including timezone)&lt;/li&gt;
&lt;li&gt;Test duration&lt;/li&gt;
&lt;li&gt;Expected peak bandwidth in Gigabits per second (Gbps)&lt;/li&gt;
&lt;li&gt;Source IP addresses generating the test traffic&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.&lt;/li&gt;
&lt;li&gt;Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.&lt;/li&gt;
&lt;li&gt;Social engineering (e.g. phishing, vishing, smishing) is prohibited.&lt;/li&gt;
&lt;li&gt;Denial of service attacks are prohibited.&lt;/li&gt;
&lt;li&gt;Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Submitting Results&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Validation requires that the assessor has reviewed the issues to remove false positives, and is able to reproduce any issues and prove to Appian that they can be used to exploit the system.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Validated vulnerabilities should be submitted to Appian Support via a support ticket.&lt;/li&gt;
&lt;li&gt;All scanning or testing documentation must be accompanied by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A summarized index of all issues found, with the severity level of each issue.&lt;/li&gt;
&lt;li&gt;Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Allowing inappropriate access to the system or its data.&lt;/li&gt;
&lt;li&gt;Allowing inappropriate modification of the system or its data.&lt;/li&gt;
&lt;li&gt;Inappropriate use of a component of the system or as a whole.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A description of the risk to the system.&lt;/li&gt;
&lt;li&gt;Guidance on how to reach the impacted end point(s).&lt;/li&gt;
&lt;li&gt;Clear steps on how to reproduce the issue.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Versions&lt;/h2&gt;
&lt;p&gt;This article applies to all versions of Appian Cloud.&lt;/p&gt;
&lt;p&gt;Last Reviewed: June 2020&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security, Cloud&lt;/div&gt;
</description></item></channel></rss>