Skip to main content

Threat detection

Threat detection enhances the security of your software supply chain by scanning your software for vulnerabilities using the Signing Manager Controller (SMCTL) interface.

Threat detection uses Role-Based Access Control (RBAC) to ensure that authorized personnel can start and oversee these scans. Scan results are integrated into your Software Trust account, providing you with a centralized hub for vulnerability, deployment risk, and license issue analysis.

There are three types of threat detection:

Threat detection type

Description

Software Composition Analysis

Scan open-source components in your development workflow to help your team automatically track, manage, and remediate licensing issues and vulnerabilities before releasing your software.

Static Binary Analysis

Scan all components of your software before release to detect malware, vulnerabilities, secrets, and other risks in both your developers’ code and any third-party integrations.

Apple notarization

Scan macOS software signed with a Developer ID for malicious components before distribution from the App Store.