INTEGRATED SECURITY PRACTICES
Essential Incorporation of best practices into every step of the development process.
APA security is ingrained within every aspect of the Automation Anywhere platform, and is now extended to enhance trust in automations. With the application of our bot security framework, all automations including those built in-house, by partners, or procured from Agentic App Store, can now be deployed reliably with secure automation development practices in alignment with prevailing Confidentiality, Integrity, and Availability (CIA) cybersecurity principles and best practices.
Check out the Developer Portal for security related topics as well as discover new developer tools, tips and training.
Essential Incorporation of best practices into every step of the development process.
Evidence of security inclusion in automation development to suit the strictest requirements and validated by external security experts.
Curriculum and testing based on our deep industry knowledge of security best practices.
Reduce risk of internally and externally developed automations.
Meet the most rigorous governance, trust, and compliance requirements.
Speed expansion of your RPA practice by passing InfoSec reviews more quickly.
In partnership with cyber security experts, Bot Security encompasses four (4) progressive levels of security designation.
Includes Level 1 security certification requirements.
Automation developers must complete the Secure Bot Developer learning path.
Our learning path has three components: Secure Bot Design, Secure Bot Development, and Secure Bot Deployment.
Each component includes a test which developers must pass.
Agentic App Store reserves the right to verify training and successful testing.
Agentic App Store also reserves the right to perform a cybersecurity assessment in order to validate that an automation employs development best practices.
Automation developers must self-attest that their automation was developed with software security controls and best practices in place.
Self-attestation of best practices is designed to secure against the OWASP Top 10 and CVE Top 25 threats. Self-attestation establishes that:
Authentication and authorization patterns are secure and well documented.
Dependent libraries are disclosed and scanned.
Cryptographic capabilities obey industry standards.
Network access of all types is conducted via secure channels.
All resource access is well documented and the least privilege principle is applied.
Sensitive information and credentials are stored in the Credentials Vault.
Exception handling does not compromise privileged information.
Includes all of Level 2 security certification requirements.
Security partner provides a Level 3 report which contains the following information:
A completed Data Flow Diagram explaining the automation process and operation.
A Threat Model outlining top threats to automation processes and assets.
Automation Scan Results and Analysis Statements explaining mitigation strategies and compensating controls to prevent identified top threats.
Clean results of malware scan of automation binary.
Completed source code scan and proof of remediation of identified vulnerabilities.
Evidence of dependency and third-party library security.
Includes all of Level 3 security certification requirements.
Security partner provides a Level 4 report which contains the following information:
A detailed outline of the testing scope for the automation in an environment consistent with how it would be deployed in a real-life environment.
A test plan with completed results as well as the completion of mandatory test cases.