The security scan requirements for API-only applications vary based on the specific configuration:
### General Requirements:
- For API-only applications, the security review does not require Source Code Scanner (Checkmarx) reports in all cases
- However, you must ensure that the application complies with the security review requirements, including addressing vulnerabilities and providing necessary documentation
### Applications Without Exposed Endpoints:
- If your application does not expose any endpoints for Salesforce to call, you are not required to submit an external web application scan report
- Make sure that all other security review requirements are fulfilled
### API-Only Services on Platforms like AWS:
- You need to provide security scan results from automated tools such as the Salesforce Code Analyzer and Source Code Scanner (Checkmarx scanner)
- These scans should cover all external endpoints that operate independently of the Salesforce platform
- Document any false-positive security violations
- Ensure all code complies with Salesforce security guidelines
### Determining the Correct Security Scan Type:
To determine the correct security scan type for API-only applications, use automated security scanning tools like Zed Attack Proxy (ZAP), Burp Suite, or other Dynamic Application Security Testing (DAST) scanners:
1. **Set Up the Scanner**: Configure your API client or browser to route traffic through the scanner tool's proxy to capture and analyze requests and responses
2. **Exercise API Endpoints**: While the scanner is running, interact with the relevant API endpoints to uncover the full attack surface
3. **Generate a Report**: After the scan, export a comprehensive report that includes the scan date, targeted endpoints, and findings
This process ensures that vulnerabilities in external endpoints are identified and addressed.