To show that deprecated components don't pose security risks in the AppExchange Security Review, you can use false positive documentation. Here's what you need to provide:
**For General Deprecated Components:**
- Explains the functionality and current state of the deprecated components
- Details why they are no longer in use and how they are isolated or disabled
- Describes measures taken to ensure they don't introduce vulnerabilities
- Includes security scan reports and explanations for any false positives, if applicable
**For Detailed False Positive Documentation:**
1. **Component Details**: Identify the deprecated component, including its name, purpose, and location in the package
2. **Reason for Deprecation**: Explain why the component is deprecated and why it cannot be removed (e.g., dependencies, backward compatibility)
3. **Security Assessment**: Provide evidence that the component does not pose a security risk, such as:
- Confirmation that it is no longer in use
- Details on how it is isolated or inaccessible to external users
- Mitigations in place to prevent misuse
4. **Code Review**: Include a review of the component's code to show it has no vulnerabilities or sensitive data
5. **Supporting Documentation**: Attach relevant references like security review findings, Checkmarx or ZAP scan reports, and other evidence
6. **Future Plans**: If applicable, outline plans for eventual removal or replacement in future package versions
**Acceptable Use Cases:**
- Yes, it is acceptable to document deprecated sensitive fields in false positive documentation
- Yes, you can use a false positive document to address a public custom metadata field that is no longer in use but cannot be modified
- The document should include a detailed explanation of why the field is no longer utilized and relevant case information or justifications
**Important Exception:**
- Unused weblinks should not be documented as false positives. Instead, it is recommended to remove them through patches to ensure they do not pose any potential security risks
**Key Differences:**
- **Deprecated Objects**: Components or settings no longer actively supported but not considered active security vulnerabilities, though they still need review
- **Actual Security Vulnerabilities**: Identified issues that could threaten integrity, confidentiality, or availability and must be addressed to pass review
Make sure the document is clear, concise, and includes screenshots or examples if needed. Submit this as part of the security review process.