Skip to main content

Ensuring that the Application Security Checklist is completed by adding the Verify security checklist task

Suggest edit Updated on July 6, 2020

For your pipeline to comply with security best practices, you can add a task to ensure that all the steps in the Application Security Checklist are performed. For customers on Pega Platform 8.4 and above, a new Security Checklist API is available to provide an automated security configuration assessment. Both candidate and orchestrator environments should be on or above Deployment Manager 4.8 to utilize this functionality.

Before you begin: You must log in to the system for which this task is configured, and then mark all the tasks in the Application Security checklist as completed for the pipeline application. For more information about completing the checklist, see Preparing your application for secure deployment.

To add the Verify security checklist task, do the following steps:

  1. Do one of the following actions:

    • Click a task, click the More icon, and then click either Add task above or Add task below.
    • Click Add task in the stage.
  2. In the Task list, click Verify Security checklist.

  3. Click Submit.

  4. Continue configuring your pipeline. For more information, see one of the following topics:

Did you find this content helpful? YesNo

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.

Ready to crush complexity?

Experience the benefits of Pega Community when you log in.

We'd prefer it if you saw us at our best. is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us