Threshold Configuration Examples¶
This document provides example threshold configurations for different environments and use cases.
Development Environment¶
More lenient thresholds for development environments:
This configuration:
- Requires a modest 70% compliance score
- Enforces zero critical vulnerabilities
- Allows up to 3 high-impact findings
- Allows up to 5 medium-impact findings
- Places no limit on low-impact findings
Staging Environment¶
Moderate thresholds for staging environments:
This configuration:
- Requires a higher 85% compliance score
- Enforces zero critical vulnerabilities
- Allows only 1 high-impact finding
- Allows up to 3 medium-impact findings
- Allows no more than 2 skipped controls
Production Environment¶
Strict thresholds for production environments:
This configuration:
- Requires a high 95% compliance score
- Enforces zero critical vulnerabilities
- Enforces zero high-impact findings
- Allows only 1 medium-impact finding
- Prohibits skipped controls
- Prohibits error controls
Compliance-Focused Example¶
Focuses only on overall compliance score:
This simple configuration only checks that the overall compliance score is at least 90%.
Critical-Only Example¶
Focuses only on critical vulnerabilities:
This configuration only checks that there are no critical vulnerabilities, regardless of overall compliance score.
Container Baseline Example¶
Focused example for container baseline scanning:
This configuration is suitable for basic container security, focusing on critical and high-impact issues.
Progressive Example¶
An example showing progression from development to production:
This example uses YAML anchors and aliases to show a progression of increasingly strict configurations.
Using These Examples¶
To use these examples:
- Copy the appropriate example to a file (e.g.,
threshold.yml
) - Run your scan with the threshold file:
- Alternatively, use with SAF CLI directly: