To provide the security review team access to scan your external web application for a managed package:
1. **Include URLs and Login Credentials**: Provide the URLs and login credentials for any external components requiring authentication as part of your security review submission.
2. **Ensure Accessibility**: Make sure all environments, packages, and external components used by your solution are accessible to the review team.
3. **Submit DAST Scan Reports**: Include Dynamic Application Security Test (DAST) scan reports in your submission.
4. **Provide Documentation**: Add any necessary documentation, such as explanations for false positives, if applicable.
5. **Scope Verification**: Ensure the endpoint is within the scope of the security review.
6. **Obtain Permissions**: If the endpoint is not owned by you, get permission from the owner to perform the scan.
7. **Use a DAST Scanner**: Utilize a Dynamic Application Security Test (DAST) scanner like ZAP or Burp Suite to analyze the endpoint.
8. **Set Up Proxy**: Configure the scanner as a proxy to capture and analyze requests and responses.
9. **Ensure Compliance**: Verify that the endpoint complies with security requirements, such as:
- Using TLS v1.2 or above
- Marking session IDs as secure
10. **Token Placement**: If the endpoint requires a token for scanning, ensure it is placed in the web application root.
11. **Address Vulnerabilities**: Document and resolve any vulnerabilities identified during the scan.
This ensures the review team can securely test the external components and verify compliance with security standards.