To obtain security scan results for third-party endpoints that you integrate with but don't own:
1. Obtain permission from the third-party owners to perform security testing on their endpoints/domains.
2. Once permission is granted, use Dynamic Application Security Testing (DAST) tools like ZAP, Burp Suite, HCL AppScan, or WebInspect to conduct the scans.
3. Document the results and include them in your submission for security review.
4. If the third party has already conducted security assessments, request their pentest reports or other security certifications and include those in your submission.
To provide a third-party web application scan report for an endpoint you do not own, follow these steps:
1. Obtain permission from the third party to conduct a security assessment of their endpoint.
2. Once permission is granted, use tools like OWASP ZAP or Burp Suite to perform the scan.
3. If you cannot conduct the scan due to lack of authorization, request the third party to provide their own security reports, such as a penetration test report or other relevant documentation.
4. Include these reports with your submission and ensure all details about the endpoint and its security certifications are clearly documented.