HCL Software

HCL AppScan on Cloud test

Application Security Testing (SaaS) · Category 9. AppSec (SaaS) · Tier 2
CL Listed — Visible
Methodology v3.5 · OLIR Schema
Avril 2026
Evaluation Tier: Visible (Listed) Verified (CAE) Enterprise (EEE) Layer 1-2 only · Documentary assessment · All capabilities vendor-claimed
Executive Summary 30 seconds

What it is

Fully managed cloud-based application security testing platform combining Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Software Composition Analysis (SCA) in a single SaaS offering. No on-premises infrastructure required — all scanning runs in HCL's cloud environment.

Best for

PCI DSS Req. 6.2/6.3 (secure development lifecycle), DORA Art. 8(4) (secure ICT development), NIST SSDF PW.6/PW.7 (code verification and testing). Ideal for organizations wanting comprehensive AppSec without managing scanning infrastructure, especially mid-market teams transitioning from manual code reviews.

What it does NOT do

No runtime protection (RASP), no WAF capabilities, no network security, no IAM, no endpoint detection, no container security. Not a runtime defense tool — focuses exclusively on pre-deployment application vulnerability identification across code, binaries, and running apps.

CL Recommendation

HCL AppScan on Cloud is a strong SaaS-first AppSec platform combining SAST, DAST, and SCA without infrastructure overhead. Critical for PCI DSS 6.x, DORA Art. 8, and NIST SSDF compliance. Combine with WAF (Cat. 6), SIEM (Cat. 12), and RASP for full application lifecycle security. Strong alternative to Veracode and Checkmarx for teams preferring cloud-managed scanning.

Regulatory Fit Per regulation verdict
PCI DSS v4.0
~18% of requirements
✔ Strong — Req. 6.2, 6.3, 6.5 (secure dev lifecycle & vulnerability scanning)
DORA
~13% of obligations
● Moderate — Art. 8(4) secure ICT dev, Art. 8(5) testing
NIS2
~12% of Art. 21
● Moderate — Art. 21(2)(e) secure dev, Art. 21(2)(d) supply chain (SCA)
GDPR
~5% of articles
△ Supporting only — Art. 25 (DPbD via secure code), Art. 32 (secure processing)
HIPAA
~7% of provisions
△ Supporting only — §164.312(a) access controls via secure code
NIST SSDF
~55% of practices
✔ Strong — PW.4, PW.5, PW.6, PW.7 (code analysis & composition analysis)
▼ Show detailed regulatory mapping (OLIR format)
PCI DSS v4.0 (PROPRIETARY)
FocalObligationOLIR Rel.Hub RefRationale
Req. 6.2.1Secure development processesDirectSA-3 / PR.PS-06Functional
Req. 6.2.3Code review before releaseDirectSA-11 / PR.PS-06Functional
Req. 6.3.1Identify vulnerabilitiesDirectRA-5 / ID.RA-01Functional
Req. 6.3.2Maintain inventory of third-party softwareContributingSR-3 / GV.SC-05Semantic
DORA (OPEN_GOV)
FocalObligationOLIR Rel.Hub RefRationale
Art. 8(4)Secure ICT dev lifecycleDirectSA-15 / PR.PS-06Functional
Art. 8(5)ICT testing methodologiesContributingSA-11 / PR.PS-06Semantic
Art. 24(1)Threat-led penetration testingContributingCA-8 / RS.AN-02Semantic
NIS2 (OPEN_GOV)
FocalObligationOLIR Rel.Hub RefRationale
Art. 21(2)(e)Security in system acquisition/devDirectSA-15 / PR.PS-06Functional
Art. 21(2)(d)Supply chain securityDirectSR-3 / GV.SC-05Functional
NIST SSDF (OPEN_GOV)
FocalObligationOLIR Rel.Hub RefRationale
PW.6Verify code meets security requirementsEquivalentSA-11 / PR.PS-06Syntactic
PW.7Review and test code for vulnerabilitiesEquivalentSA-11 / PR.PS-06Syntactic
PW.4Reuse secure software componentsDirectSR-3 / GV.SC-05Functional
RV.1Identify and confirm vulnerabilitiesDirectRA-5 / ID.RA-01Functional

Articles without contribution omitted. Full OLIR mapping available in Audit Pack export.

🎯 Buyer Guidance Decision support

✔ Consider When

  • + Need SAST + DAST + SCA in a single cloud-managed platform
  • + No appetite for managing on-prem scanning infrastructure
  • + PCI DSS Req. 6.2/6.3 secure development lifecycle compliance
  • + NIST SSDF compliance for government or regulated industries
  • + Mid-market team needing comprehensive AppSec without enterprise complexity
  • + Open-source dependency risk management via SCA

❌ Avoid When

  • Require on-premises scanning for air-gapped environments
  • Need runtime protection (RASP) or WAF capabilities
  • Extremely sensitive code that cannot leave your network
  • Need container and Kubernetes security scanning
  • Budget-constrained startup — Snyk or GitHub Advanced Security may be cheaper
  • Need advanced IAST capabilities
Capabilities 20 claimed · 4 groups · DR-2 Quality Tiers + Config Modifiers
Cloud SAST 5✓ 0● 0✗
Multi-language static analysis
Java, C#, Python, JavaScript, Go, PHP, Swift, and more
Specific Obl.Out-of-Box
IaC security scanning
Terraform, CloudFormation, Docker, Kubernetes manifests
Control FamilyConfig Change
Incremental scanning
Scan only changed files for fast CI/CD feedback
Generic ControlOut-of-Box
Custom rule creation
Organization-specific security rules
Control FamilyConfig Change
Fix recommendations
AI-assisted remediation suggestions with code snippets
Data SurfacedOut-of-Box
Cloud DAST 4✓ 1● 0✗
Automated web app scanning
OWASP Top 10 and CWE/SANS Top 25 coverage
Specific Obl.Out-of-Box
API security testing
REST, SOAP, GraphQL endpoint scanning
Specific Obl.Config Change
Authenticated scanning
Login macro recording and replay
Control FamilyConfig Change
Mobile app testing
Android and iOS dynamic testing
Control FamilyConfig Change
Scheduled scanning
Automated recurring scan configuration
Control FamilyOut-of-Box
SCA & Open Source 5✓ 0● 0✗
Open-source vulnerability detection
CVE/NVD matching for third-party libraries
Specific Obl.Out-of-Box
License risk analysis
GPL, AGPL, MIT, Apache license compliance
Control FamilyOut-of-Box
Dependency tree mapping
Transitive dependency vulnerability tracking
Control FamilyOut-of-Box
SBOM generation
Software Bill of Materials in CycloneDX/SPDX format
Specific Obl.Out-of-Box
Outdated component alerts
Notifications for end-of-life and unsupported packages
Generic ControlOut-of-Box
Platform & Integration 5✓ 0● 0✗
CI/CD integration
Jenkins, Azure DevOps, GitLab, GitHub Actions plugins
Control FamilyOut-of-Box
IDE plugins
VS Code, IntelliJ, Eclipse real-time feedback
Generic ControlOut-of-Box
REST API
Full programmatic access for automation
Control FamilyOut-of-Box
Compliance reporting
PCI DSS, OWASP, CWE pre-built report templates
Specific Obl.Out-of-Box
Role-based access control
Multi-tenant with granular permissions
Control FamilyConfig Change
🛡 MITRE ATT&CK Mapping Layer 4 — Derived via SP 800-53
M1016
Vulnerability Scanning
Full (claimed)
M1051
Update Software
Full (claimed)
M1050
Exploit Protection
Partial (claimed)
M1013
Application Developer Guidance
Full (claimed)

Score: 3.5 / 5.0 (70%) — All vendor-claimed. Techniques addressed: T1190, T1059, T1203, T1195 (exploitation & supply chain family).

▼ Show ATT&CK techniques detail
TechniqueNameHow AddressedProvenance
T1190Exploit Public-Facing ApplicationSAST/DAST identifies exploitable web app vulnerabilities before deploymentDERIVED via M1016
T1059Command and Scripting InterpreterSAST detects injection flaws in source code; DAST validates at runtimeDERIVED via M1016
T1203Exploitation for Client ExecutionIdentifies XSS, CSRF, and client-side injection vulnerabilitiesDERIVED via M1050
T1195Supply Chain CompromiseSCA identifies vulnerable and malicious open-source dependenciesDERIVED via M1051
📄 Evidence Pack DR-2 §5.1 — Proof of value
SAST scan reports (PDF/XML)
Detailed source code findings with CWE mapping. Cloud-hosted and exportable.
DAST scan reports
OWASP Top 10 compliance evidence. PDF/HTML export.
SCA vulnerability reports
Open-source library CVE inventory with remediation paths.
SBOM export
CycloneDX and SPDX format Software Bill of Materials.
Compliance mapping reports
PCI DSS, OWASP, CWE/SANS pre-built templates.
SOC 2 Type II report
Cloud platform security independently audited.

Evidence level: Documentary review only (CL Listed). For verified evidence, upgrade to CAE (Examine + Interview) or EEE (+ Test).

Operational Metrics & Anti-Hype DR-2 §5.1 + §9.2
MetricStandard (SAST or DAST)Professional (SAST+DAST+SCA)Enterprise (Full Platform)
Implementation1-2 weeks2-4 weeks4-8 weeks
FTE Required0.25 FTE0.5 FTE0.75-1 FTE
Time to first valueDay 1-3 (first SAST or DAST scan on primary application)
Time to productionMonth 1-3 (all apps onboarded, CI/CD gates active, SCA policies tuned)
Anti-Hype: Marketing vs. Reality
Complete AppSec platform in the cloud
Covers SAST, DAST, and SCA. No IAST, RASP, or container security. Complementary tools still needed.
Partial
No infrastructure to manage
Verified. Fully SaaS — no on-prem servers, scanners, or agents required for cloud scanning.
Verified
Enterprise-grade SAST
Solid SAST engine (ex-IBM AppScan heritage) but language coverage narrower than Fortify or Checkmarx.
Partial
AI-powered vulnerability prioritization
ML-based risk scoring exists but requires tuning. Initial false positive rates can be 20-30%.
Partial
Seamless migration from IBM AppScan
Strong compatibility for existing AppScan users. Policy and configuration migration tools available.
Verified
Strengths & Cautions

✔ Strengths

  • + SAST + DAST + SCA combined in single cloud platform
  • + Zero infrastructure overhead — fully managed SaaS
  • + Strong IBM AppScan heritage and mature scanning engines
  • + Pre-built PCI DSS and OWASP compliance reports
  • + SBOM generation for supply chain transparency
  • + Good CI/CD integration with major DevOps tools
  • + Multi-tenant cloud architecture with role-based access

⚠ Cautions

  • ! SAST language coverage narrower than Fortify (33 languages) or Checkmarx
  • ! No on-prem option for air-gapped or data-sovereign environments
  • ! Code leaves your network for cloud-based scanning
  • ! No IAST or RASP capabilities
  • ! Post-IBM acquisition brand recognition still building
  • ! Initial false positive rates require tuning (20-30%)
  • ! All capabilities VENDOR-CLAIMED (no CL independent testing)
📈 Competitive Positioning Category 9 — AppSec (SaaS)
CapabilityHCL AppScan on Cloud testVeracodeSnykGitHub Advanced Security
Cloud SAST
Cloud DAST
SCA
SBOM generation
CI/CD integration
On-prem option
Pricing entryMid-marketEnterpriseFree tierGitHub Enterprise

Competitive data based on public information. CL has not evaluated these alternatives — for detailed assessment, see individual CL Listings.

📑 Framework Views Hub: CSF 2.0 + 800-53r5 + ISO 27001
▼ Show NIST SP 800-53, CSF 2.0, ISO 27001 mapping tables
NIST SP 800-53 Rev 5
ControlNameContributionProvenance
SA-11Developer Testing & EvaluationdirectDERIVED via PCI DSS 6.2
SA-15Development Process & StandardsdirectDERIVED via DORA Art. 8(4)
RA-5Vulnerability Monitoring & ScanningdirectDERIVED via PCI DSS 6.3
SR-3Supply Chain Controls & ProcessesdirectDERIVED via NIS2 Art. 21(2)(d)
SA-3System Development Life CyclecontributingCL-ORIGINAL
NIST CSF 2.0
ControlNameContributionProvenance
PROTECTPR.PS-06 Secure software developmentdirectDERIVED via SA-11
IDENTIFYID.RA-01 Vulnerability identificationdirectDERIVED via RA-5
GOVERNGV.SC-05 Supply chain risk managementdirectDERIVED via SR-3
DETECTDE.CM-09 Software monitoringcontributingCL-ORIGINAL
ISO 27001:2022 Annex A
ControlNameContributionProvenance
A.8.25Secure development life cycleEquivalentOFFICIAL via ISO 27034
A.8.29Security testing in dev & acceptancedirectDERIVED via NIS2-ISO
A.8.28Secure codingdirectDERIVED via OWASP-ISO
A.8.8Management of technical vulnerabilitiesdirectDERIVED via CVE-ISO
A.5.21Managing ICT supply chain riskscontributingCL-ORIGINAL
▼ Show Vendor Security Practices (SSDF / CRA)
SSDF IDPracticeStatus
PW.1Risk-based secure designClaimed
RV.2Timely vulnerability remediationClaimed
PO.5Secure development environmentClaimed
PS.3SBOM availableClaimed
RV.1Vulnerability disclosure programClaimed
PS.2Code signingUnknown
Compliance Labs · Software Listing v3.5 · OLIR Schema Hub: CSF 2.0 ↔ 800-53r5 ↔ ISO 27001 · Avril 2026
Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Vendor
  • Category
  • CL Tier
  • Short description
  • Website
  • What it is
  • Best for
  • Does NOT do
  • CL verdict
  • Regulatory coverage
  • Frameworks tested
  • Capabilities
  • MITRE ATT&CK
  • Strengths
  • Cautions
  • Anti-hype claims
  • Operational metrics
  • Evidence pack
Compare
Compare ×
View comparison Continue browsing software