KB-1447 Vulnerability Testing

The following rules apply to all scanning activity, penetration testing, or other vulnerability assessment performed against Appian Cloud sites or the Appian platform:

Assessment Rules

  • All planned security testing by customers must be submitted to Appian Technical Support at least 3 business days prior to testing via a support case.
  • The following details must be provided in the support case to prevent Appian or its hosting service providers from adding the test source IP addresses to a block list:
    • Contact information
    • Start time of test (including timezone)
    • Test duration
    • Expected peak bandwidth in Gigabits per second (Gbps)
    • Source IP addresses generating the test traffic
  • Only perform assessments against the Appian Cloud Sites or FQDNs for which you have explicit approval.
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.
  • Social engineering (e.g. phishing, vishing, smishing) is prohibited.
  • Denial of service attacks are prohibited.
  • Appian recommends performing assessments against a test or development site whenever possible, rather than a production site.

Submitting Results

  • All submitted vulnerabilities must be validated by the assessor prior to submission. Appian does not accept unvalidated results or direct output from automated scanners without additional validation.
    • Validation requires that the assessor has reviewed the issues to remove false positives, and is able to reproduce any issues and prove to Appian that they can be used to exploit the system.
  • Validated vulnerabilities should be submitted to Appian Support via a support ticket.
  • All vulnerability documentation (including results, summaries, and steps) must be submitted in English.
  • All scanning or testing documentation must be accompanied by:
    • A summarized index of all issues found, with the severity level of each issue.
    • Clear evidence performed by the assessor showing that the proposed vulnerability can be used to exploit the system, for example by:
      • Allowing inappropriate access to the system or its data.
      • Allowing inappropriate modification of the system or its data.
      • Inappropriate use of a component of the system or as a whole.
    • A description of the risk to the system.
    • Guidance on how to reach the impacted end point(s).
    • Clear steps on how to reproduce the issue.

What to Expect Next

  • Appian will review the findings (assuming all submission requirements have been met) and accept or reject the individual findings.
    • For rejected findings, Appian will provide an explanation as to why the reported vulnerability has been rejected (false-positive, configuration level controls available to mitigate, etc.).
    • For accepted findings, Appian will classify the severity of the finding as Low/Medium/High/Critical.
  • Appian Support will provide analysis and assessment of the report and individual findings through the support case. 

Affected Versions

This article applies to all versions of Appian Cloud.

Last Reviewed: August 2020