🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Integrate Automated Security Testing in CI/CD for External Web Applications for Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-15-3

Practical, step-by-step guidance to embed automated SAST/DAST/SCA into CI/CD pipelines to meet ECC – 2 : 2024 Control 2-15-3 for external web applications.

April 01, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

External web applications are one of the highest‑risk assets for any organization; ECC – 2 : 2024 Control 2-15-3 expects organizations to integrate automated security testing into CI/CD so that vulnerabilities are detected early, triaged, and remediated before public exposure—this post explains practical steps, pipeline examples, and compliance artifacts you can implement today to meet that requirement.

What Control 2-15-3 requires (practical interpretation)

At a practical level for the Compliance Framework, Control 2-15-3 requires that external-facing web applications be subject to automated security testing integrated into the CI/CD lifecycle. Key objectives are continuous detection of coding and configuration flaws (SAST), dependency and supply-chain issues (SCA), and runtime/HTTP issues (DAST), and ensuring test results produce auditable evidence (scan reports, triage tickets, pipeline logs) and remediation tracking tied to SLAs. Implementation notes emphasize authenticating scans where needed, protecting scan credentials, and protecting availability of production systems (rate limits, staging scans).

How to implement: tools, placement, and pipeline flow

Use a layered approach: SAST and SCA run in pull request (PR) checks to catch issues in code/dependencies, while DAST runs against ephemeral environments (review apps or staging) after deployment. Recommended tools: Semgrep or Bandit (SAST), Snyk/OSSIndex/Trivy for SCA, and OWASP ZAP or Burp Suite (automated mode) for DAST. For small businesses, open source tools (Semgrep, Trivy, ZAP) provide strong coverage and low cost; larger shops can add commercial products for broader rule sets and support.

CI/CD placement and secrets: configure SAST and SCA as fast PR checks (under 5–10 minutes if possible) and gate merges on policy thresholds. Configure DAST to run on ephemeral review apps or a dedicated staging environment that mirrors production (TLS, auth). Store any scanning credentials (test accounts, API keys) in a secrets manager (HashiCorp Vault, AWS Secrets Manager, GitHub/GitLab secrets) and rotate them regularly. Ensure scans run with least privilege and are rate-limited so they do not impact production availability.

Example: GitHub Actions snippet for SAST + DAST (concise)

Below is a minimal example to illustrate integration: run Semgrep in PRs, deploy a review app, then run an OWASP ZAP baseline scan against the review URL. Place long-running or high-bandwidth scans outside the PR gate if they risk delaying delivery.

# .github/workflows/security-ci.yml
name: security-ci
on: [pull_request]

jobs:
  sast:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - name: Run Semgrep
        run: pip install semgrep && semgrep --config=p/ci --json --output semgrep-report.json
      - name: Upload Semgrep report
        uses: actions/upload-artifact@v4
        with:
          name: semgrep-report
          path: semgrep-report.json

  deploy-and-dast:
    needs: sast
    runs-on: ubuntu-latest
    steps:
      - name: Deploy review app (example)
        run: ./scripts/deploy_review_app.sh $
      - name: Run ZAP baseline
        run: docker run --rm -v $(pwd):/zap/wrk/:rw owasp/zap2docker-weekly zap-baseline.py -t https://review-app.example.com -r zap_report.html
      - name: Upload ZAP report
        uses: actions/upload-artifact@v4
        with:
          name: zap-report
          path: zap_report.html

Authenticated DAST and scan safety

For external web apps with authentication, configure DAST with a test account and scripted login flows (ZAP contexts + authentication scripts, or automated browser login via Puppeteer/Selenium). Example: use ZAP's session authentication or run it in daemon mode and submit a login POST to get the session cookie, then scan the authenticated context. Always perform DAST against a staging/review environment—never run aggressive scans directly against production without an approved change window and operational controls (rate‑limits, time windows).

Small business scenario: an ecommerce example

Imagine a small ecommerce company using GitHub, Heroku review apps, and Jira. Practical steps: 1) Add Semgrep to PR checks to catch common XSS/SQL injection patterns. 2) Add Trivy to the build to scan Docker images for vulnerable packages. 3) Deploy review apps automatically and run OWASP ZAP baseline against them. 4) Upload reports to a central S3 bucket and generate a Jira ticket automatically when a scan finds high severity issues (CVSS >= 7). This approach provides a lightweight, auditable loop that meets Control 2-15-3's evidence requirements: pipeline logs, reports, and tickets.

Compliance tips, thresholds, and evidence

Best practices to demonstrate compliance: define severity thresholds and SLAs (e.g., critical/high remediated or mitigated within 7–30 days, medium within 30–90 days), map scanner severity to CVSS, require a security reviewer sign-off on exceptions, and record evidence: PR check pass/fail history, uploaded scan reports (timestamped), and linked remediation tickets with status. Maintain an exceptions register for findings where a planned mitigation is accepted and logged. Keep tool configurations and rule sets under version control as compliance artifacts.

Risk of not implementing automated CI/CD security testing

Failing to integrate automated testing increases the risk that exploitable vulnerabilities (unpatched dependencies, injection flaws, misconfigured TLS/CSP) reach production. Consequences for external web applications include data breaches, service disruption, regulatory fines, and reputational damage—small businesses are often targeted because they lack mature controls. From a compliance perspective, lack of automated testing makes producing timely, auditable evidence difficult when responding to assessments or incidents.

In summary, meeting ECC – 2 : 2024 Control 2-15-3 is achievable with a pragmatic, layered approach: run SAST and SCA in PRs, run DAST against ephemeral/staging environments, protect scan credentials, map severity to SLAs, and retain reports and tickets as evidence. Start small with open source tools and CI templates, automate report uploads and ticket creation, and iterate—this creates a continuous, auditable security testing lifecycle that satisfies the Compliance Framework while keeping your external web apps safer.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes