Built for you

For application security program leads
who own AppSec as a discipline, not as a backlog

Application security program leads own the AppSec discipline across multiple applications, multiple engineering organisations, and multiple AppSec teams. The work spans the multi-year programme plan, the per-tier coverage model, the scanner stack standard, the BSIMM and SAMM measurement cycle, the OWASP ASVS verification level by application, the champions programme, the AppSec OKR, the capacity plan for the AppSec teams, the vendor management cycle for the AppSec tool stack, and the AppSec posture report into the CISO, the steering committee, and the audit committee. SecPortal pairs engagement records per workstream, findings management with CVSS 3.1 and owner-of-record, code scanning via Semgrep against connected GitHub, GitLab, and Bitbucket repositories under OAuth, authenticated DAST with encrypted credential storage, compliance tracking across OWASP ASVS, OWASP SAMM, BSIMM-adjacent measurement, NIST SSDF, ISO 27001 Annex A, SOC 2, and the other 21 supported frameworks, AI-assisted reporting, role-based access control, and an append-only activity log on one workspace, so the AppSec programme reads from one record rather than from a spreadsheet of applications, a deck of OKRs, and a folder of scanner exports.

No credit card required. Free plan available forever.

An application security programme platform built around the AppSec programme record

Application security program leads own the AppSec discipline across multiple applications, multiple engineering organisations, and multiple AppSec teams. The work spans the multi-year programme plan, the per-tier coverage model, the scanner stack standard, the OWASP ASVS verification level by application, the OWASP SAMM or BSIMM-style measurement cycle, the champions programme, the AppSec OKR, the capacity plan, the vendor management cycle for the AppSec tool stack, and the AppSec posture report into the CISO, the steering committee, and the audit committee. Most programmes carry this work in a portfolio spreadsheet, a coverage spreadsheet, a verification level spreadsheet, a SAMM or BSIMM tracker, a champions Confluence page, an OKR slide deck, and a vendor evaluation matrix, and pay the cost in reconciliation hours each cycle and in residual programme drift between cycles.

SecPortal gives application security program leads one workspace for engagement records per AppSec workstream, findings management with CVSS 3.1 scoring and owner-of-record across every source, code scanning via Semgrep against connected GitHub, GitLab, and Bitbucket repositories under OAuth, authenticated DAST with encrypted credential storage, external scanning across the verified perimeter, compliance tracking that covers OWASP ASVS, OWASP SAMM, NIST SSDF, ISO 27001 Annex A, SOC 2, and the other 21 supported frameworks in parallel, AI-assisted programme reporting, role-based access control with multi-factor authentication, document management for plans and OKRs and measurement evidence, and an append-only activity log that ties the trail together. The AppSec programme reads from one record rather than from a folder of spreadsheets and a deck of OKRs.

Capabilities AppSec program leads use cycle to cycle

Engagement records per AppSec workstream

Open an engagement per workstream (portfolio onboarding, per-application baseline, scanner stack rollout, OWASP ASVS verification cycle, OWASP SAMM or BSIMM-style measurement cycle, champions programme intake, scanner vendor evaluation cycle, OKR review). The plan, the application list, the per-application coverage matrix, the verification level mapping, the measurement evidence, the OKR artefacts, and the steering committee minutes attach as documents on the same engagement record. The programme reads from one workspace rather than from a slide deck, a Confluence space, and a folder of spreadsheets.

Findings management with owner-of-record across the application portfolio

Every AppSec finding lands on the engagement record for the application with an auto-calculated CVSS 3.1 vector, severity, evidence, named owner, and remediation status. SAST and SCA results from Semgrep-based code scanning against connected GitHub, GitLab, or Bitbucket repositories, authenticated DAST output, external scanning across the verified perimeter, manually logged third-party pentest findings, and bug bounty submissions consolidate on the same record. The portfolio backlog reads from one queue rather than from four scanner consoles, an inbox of pentest PDFs, and a triage spreadsheet.

Code scanning across connected repositories

Connect GitHub, GitLab, or Bitbucket through OAuth and run Semgrep-based SAST and dependency auditing across the repositories in scope. Scheduled scans run on a per-repository cadence the programme lead sets per asset tier. Findings land on the engagement record for the application with rule references and evidence, so the AppSec programme lead reads scanner coverage by application from the live record rather than from a coverage spreadsheet maintained by hand.

Authenticated DAST with encrypted credential storage

Authenticated DAST runs against pages that sit behind the login screen. Cookie, bearer token, basic auth, and form login modes are supported, and credentials are encrypted at rest with AES-256-GCM, so the programme lead can standardise authenticated scanning across tier-one applications without storing credentials in a shared password manager. The credential rotation cadence sits on the engagement record and the activity log records every credential change with the actor and the timestamp.

Cross-framework compliance tracking

Compliance tracking maps engagement records and findings against OWASP ASVS verification levels, OWASP SAMM practices, NIST SSDF practices, ISO 27001 Annex A, SOC 2 Trust Services Criteria, PCI DSS requirements, NIST SP 800-53 control families, NIST CSF 2.0 functions, Cyber Essentials, and the other 21 supported frameworks on the same record. One mapping satisfies multiple audit packs and a single per-application engagement record can read against ASVS verification level, SAMM practice score, and SOC 2 CC7 evidence in parallel.

AI-assisted AppSec programme reporting

AI-assisted reporting regenerates AppSec executive summaries, per-application status writeups, programme remediation roadmaps, OKR progress narratives, scanner coverage readouts, and compliance summaries from the live engagement data on demand. The CISO readout, the steering committee deck, the audit committee report, and the engineering management readout regenerate from the same record the AppSec teams operate on, so the leadership view stays anchored to operational reality between cycles.

Role-based access control and multi-factor authentication

Role-based access control scopes AppSec engineers, champions in product teams, engineering owners, audit observers, and the steering committee participants to the engagements they actually need. Multi-factor authentication is enforced on every account, so the cross-team access model is enforced by the platform rather than asserted in an onboarding email. The champions programme reads on the same record the central AppSec team operates on, with each champion scoped to the applications they cover.

Append-only activity log across the AppSec programme

Every finding update, scan run, document upload, retest run, exception decision, comment, credential rotation, and team change is recorded with the actor, the entity, the timestamp, and the action. Plan retention covers 30, 90, or 365 days, and CSV export keeps the programme trail reproducible at audit time without a multi-team excavation of email and chat history. The audit committee reads the same trail the programme lead operates from.

Notifications, assignment, and retest workflow

Findings, retests, exceptions, document uploads, and team changes route notifications to named owners through the in-app notifications feed, so the AppSec programme cadence stays observable between forum cycles rather than living in chase threads. Retesting workflows close the loop from open finding to verified close on the same record the original finding was opened on.

How AppSec program leads run the discipline inside SecPortal

An AppSec programme that holds up under board review, regulatory scrutiny, and incident post-mortem operates on a small set of disciplines. The portfolio plan, the per-application coverage matrix, the verification level mapping, the measurement evidence, the OKR artefacts, the champions intake, the scanner stack standard, and the audit-evidence trail inherit each one rather than carving out a parallel operating model per artefact.

  • Treat each AppSec workstream as a structured engagement record rather than as a recurring meeting. The portfolio plan, the per-application coverage matrix, the verification level mapping, the measurement evidence, the OKR artefacts, the champions intake, and the scanner stack standard live on the same record across the workstream lifecycle.
  • Run scanner coverage by application off the live engagement record rather than a coverage spreadsheet. Code scanning against connected repositories, authenticated DAST against pages behind the login screen, and external scanning on the verified perimeter all attach to the engagement record for the application, so coverage reads from a query against the record rather than a hand-curated artefact.
  • Anchor OWASP ASVS verification levels, OWASP SAMM practice scores, and BSIMM-style activity prevalence against the same engagement records that hold the live operational evidence, through compliance tracking. The verification level on a tier-one application, the SAMM practice score for the programme, and the BSIMM-adjacent activity evidence read from the live record rather than from three reconciled artefacts.
  • Run scanner stack evaluation cycles as engagement records that capture the evaluation criteria, the comparison evidence, the migration plan, and the decision record on one workspace. Engagement records for the prior cycle become the evidence trail the next renewal cycle reads from, so the evaluation work compounds rather than restarts each renewal.
  • Run the AppSec champions programme on the same workspace the central AppSec team operates from. Role-based access control scopes each champion to the engagements for the applications they cover, findings carry an owner-of-record, and the activity log records every champion-side update with the actor and the timestamp.
  • Regenerate the AppSec leadership view from the live record through AI-assisted reporting rather than maintain a parallel reporting artefact. The CISO readout, the steering committee deck, the audit committee report, and the engineering management readout read from the same engagement record the AppSec teams operate on.
  • Maintain an append-only activity trail across every workstream, every finding, every exception decision, every retest, every document version, every credential rotation, and every team change, so the question of why the AppSec programme made a specific decision has a single defensible answer at audit time.

From portfolio plan to audit committee readout, on one engagement record

The AppSec programme loop is open the workstream, run the scanner coverage, land the findings, map the controls, record the exceptions, route the cross-team work, regenerate the leadership view, and read the recurring cadence. SecPortal runs a single workflow that the programme lead, the AppSec teams, the champions, the engineering owners, the steering committee, and the audit committee can all work against without re-keying state into another tool.

  1. 1Open an engagement per AppSec workstream and per application that needs a structured baseline. Capture the workstream plan, the application owner, the asset tier, the in-scope repositories, the in-scope authenticated DAST targets, the verification level target, the agreed scanner stack, and the audit framework set on the engagement record. Attach the portfolio matrix, the capacity plan, the OKR target, and the champion roster as documents.
  2. 2Run scanner coverage off the engagement record. Code scanning runs Semgrep-based SAST and dependency auditing across the connected GitHub, GitLab, or Bitbucket repositories. Authenticated DAST runs against pages behind the login screen with encrypted credentials. External scanning runs across the verified perimeter for the application. Every scan execution and finding lands on the engagement record for the application, so per-application coverage reads from the live record.
  3. 3Land every finding on the engagement record for the application with auto-calculated CVSS 3.1 vector, severity, evidence, named owner, and remediation status. Manual third-party pentest findings, bug bounty submissions, threat model action items, and exception decisions consolidate on the same record. Findings deduplication, prioritisation, and the owner-of-record routing read from one queue.
  4. 4Map findings, scanner output, and engagement records against OWASP ASVS verification levels, OWASP SAMM practices, NIST SSDF practices, ISO 27001 Annex A, SOC 2 Trust Services Criteria, PCI DSS requirements, and the other supported frameworks through compliance tracking. The ASVS verification level for the application, the SAMM practice score for the programme, and the SOC 2 CC7 evidence pack read from the same engagement record.
  5. 5Capture risk acceptances, exceptions, and compensating-control decisions on the same record as the findings they cover, with linked finding, severity, compensating controls, residual likelihood, residual impact, business rationale, expiry, and review cadence. The exception register reads as a queue of dated decisions with named owners and explicit expiry rather than as a narrative document the audit committee cannot reconstruct decision chains from.
  6. 6Route the work through role-based access control and multi-factor authentication. AppSec engineers see the engagements for the applications they cover, champions in product teams see the engagements for the applications they sponsor, engineering owners see the findings assigned to them, and the steering committee reads the programme posture across the portfolio without seeing the full operational backlog.
  7. 7Regenerate the AppSec leadership view through AI-assisted reporting. Executive summaries, per-application status writeups, programme remediation roadmaps, OKR progress narratives, scanner coverage readouts, and compliance summaries draft from the live engagement data on demand. The programme lead edits drafts rather than writes the deck from a blank page each cycle.
  8. 8Read the recurring programme cadence from the append-only activity log. Every finding update, scan run, document upload, retest run, exception decision, comment, credential rotation, and team change is recorded with the actor, the timestamp, and the action. CSV export keeps the programme trail reproducible at audit time.

Where the AppSec programme view connects to the rest of the workspace

Most AppSec programme functions adopt SecPortal in three phases: bring every AppSec workstream and every tier-one application onto an engagement record so the plan, the coverage matrix, the verification level, and the findings live on one record; layer in code scanning and authenticated DAST so per-application coverage runs off the live record rather than a coverage spreadsheet; and route the OKR and audit cadence through compliance tracking, role-based access control, and AI-assisted reporting so the CISO, the steering committee, the audit committee, and the engineering management readout all read from the same source the AppSec teams run on. The relevant capability, workflow, framework, and blog pages explain each phase in detail.

Where the AppSec program lead role sits next to adjacent personas

Application security program leads run the discipline layer that sits between the executive sponsor (the CISO), the cross-team programme coordinator (the security program manager), the per-team practitioners (the AppSec team), the pipeline-side delivery function (the DevSecOps team), the cross-cutting product security organisation (the product security team), and the design-time control layer (the security architect). The AppSec program lead owns the AppSec discipline as a whole rather than any one of those operational shapes.

If your function is the practitioner-side AppSec team that owns authenticated DAST, SAST, SCA, pentest triage, and per-finding remediation on the engagement record the programme lead opens, the SecPortal for application security teams page covers the day-to-day operator workflow underneath the AppSec discipline layer.

If your function is the pipeline security and CI-side delivery layer that operationalises SAST, SCA, secrets scanning, and authenticated DAST in the developer flow, the SecPortal for DevSecOps teams page covers the pipeline-side operating model that pairs to the AppSec discipline layer.

If your function is the parallel leadership track that owns the developer security platform strategy (scanner stack standard, OAuth connector model, scheduled scans, encrypted credentials, gating model, OKRs and KPIs) rather than the AppSec discipline itself, the leadership-tier sister page SecPortal for DevSecOps platform leads covers the leadership reporting workflow on the developer security platform side that pairs to the AppSec discipline reporting workflow.

If your function is a cross-cutting product security organisation that sits between engineering, AppSec, vulnerability management, and incident response with PSIRT-style intake on top, the SecPortal for product security teams page covers the security review intake, security champion portal, and PSIRT lifecycle that sit alongside the AppSec programme.

If your function is the cross-team programme coordination layer above multiple security disciplines rather than the AppSec discipline specifically, the SecPortal for security program managers page covers the cross-discipline programme management view that the AppSec programme reads into.

If your function is programme-level executive sponsorship and board-level reporting rather than the AppSec discipline specifically, the SecPortal for CISOs and security leaders page covers the leadership-tier reporting workflow that sits above the AppSec programme view.

If your function is the design-time and architecture-review side of AppSec rather than the programme-coordination layer, the SecPortal for security architects page covers the threat modelling, design review, and control-to-architecture mapping workflow.

If your evaluation is between an Application Security Posture Management (ASPM) aggregation layer above an existing AppSec scanner stack and a delivery workspace that scans, records findings, generates reports, and ships through a branded portal on its own, the SecPortal vs ArmorCode comparison walks through the difference between an aggregation layer and a delivery workspace, with a side-by-side on scanning coverage, finding ownership, deliverables, and the buyer assumptions each shape is built for.

SecPortal is built for AppSec program leads who want one workspace for the plan-cover-track-map-measure-report loop: engagement records per AppSec workstream, code scanning across connected repositories, authenticated DAST against pages behind the login screen, findings management with owner-of-record across every source, multi-framework compliance tracking that covers OWASP ASVS and OWASP SAMM in parallel with NIST SSDF, ISO 27001 Annex A, and SOC 2, AI-assisted programme reporting, role-based access control with multi-factor authentication, and an append-only activity log on top. AppSec teams get one operational record per application, champions get scoped access to the applications they cover, engineering management gets a leadership view anchored to operational reality, and the AppSec program lead gets back the hours that used to disappear into reconciliation between portfolio spreadsheets, coverage spreadsheets, and OKR decks.

The problems you face

And how SecPortal solves each one.

The AppSec programme plan lives in a slide deck, the application portfolio in a spreadsheet, the scanner coverage in another spreadsheet, the OWASP ASVS verification levels in a third spreadsheet, and the BSIMM or SAMM activity catalogue in a fourth spreadsheet, so every quarterly review rebuilds the picture from the floor

Open an engagement per AppSec workstream (portfolio onboarding, per-application baseline, scanner stack rollout, ASVS verification cycle, SAMM or BSIMM measurement cycle, champions programme intake, vendor evaluation cycle, OKR review). The plan, the application list, the per-application coverage matrix, the verification level mapping, the measurement evidence, and the OKR artefacts attach as documents on the same record. The programme reads from one workspace, the workstream owners and the steering committee read the same artefact set, and the picture survives staff rotation, tool migrations, and reorganisations.

Scanner coverage is uneven across the application portfolio, but the programme lead cannot answer in one query which applications run SAST, which run SCA, which run authenticated DAST, which have a current threat model, and which are running on the agreed scanner stack standard

Connect GitHub, GitLab, or Bitbucket via OAuth and run Semgrep-based SAST and dependency auditing across the repositories in scope. Authenticated DAST runs against pages behind the login screen with encrypted credentials. External scanning across 16 modules runs on the verified perimeter. Every scan execution and finding lands on the engagement record for the application, so per-application coverage reads from one query against the live record rather than from a coverage spreadsheet the programme lead maintains by hand.

OWASP ASVS verification levels, OWASP SAMM practice scores, and BSIMM-style activity prevalence are tracked in parallel artefacts that drift apart, so the programme lead cannot answer at a steering committee whether the verification level on a tier-one application is L2 or L3, whether the SAMM practice score has moved this cycle, or whether the BSIMM-adjacent activities are still in place after the last reorganisation

Compliance tracking maps engagement records and findings against OWASP ASVS by verification level, OWASP SAMM by practice, NIST SSDF by practice, ISO 27001 Annex A, SOC 2 Trust Services Criteria, PCI DSS requirements, and the other 21 supported frameworks. The SAMM practice page, the BSIMM framework page, and the OWASP ASVS framework page each link to the engagement record that holds the live evidence, so the steering committee, the audit committee, and the engineering organisation read the same per-application verification level and the same per-practice measurement evidence rather than three reconciled artefacts.

AppSec capacity planning is a quarterly negotiation across product engineering for review headcount, scanner triage capacity, threat modelling slots, pentest budget, and champions programme time, and the programme lead carries the planning artefacts in a deck that never connects back to the operational reality the AppSec teams are running on

Each capacity workstream runs as an engagement record with named owners, the capacity numbers attached as documents, and the operational reality attached as the live findings the AppSec team is closing on the same record. The capacity plan, the review backlog, the scanner triage queue, the threat modelling pipeline, the pentest schedule, and the champions programme cadence read from the same workspace, so the planning artefacts and the operational reality stop drifting apart between cycles.

AppSec vendor management for the SAST tool, the SCA tool, the DAST tool, the secrets-scanning tool, the threat modelling tool, and the bug bounty platform is a parallel track of contracts, renewals, evaluation matrices, and migration plans, and the programme lead spends each renewal cycle reassembling the evaluation evidence from scratch

Run scanner stack evaluation cycles as engagement records that capture the evaluation criteria, the comparison evidence, the migration plan, and the decision record on one workspace. Engagement records for the prior cycle become the evidence trail the next renewal cycle reads from, so the evaluation work compounds rather than restarts. The platform RFP template, the vendor scorecard template, and the comparison matrix tooling sit in /tools and link directly to the live evaluation engagement.

AppSec OKR reporting into product engineering leadership, the CISO, the steering committee, and the audit committee is a multi-day copy-paste exercise across scanner exports, ticket comments, threat model spreadsheets, and last-cycle decks, and the leadership view drifts away from the operational reality the AppSec teams are running on between cycles

AI-assisted reporting regenerates AppSec executive summaries, per-application status writeups, programme remediation roadmaps, OKR progress narratives, and compliance summaries from the live engagement data on demand. The leadership view, the steering committee deck, the audit committee report, and the engineering management readout read from the same record the AppSec teams run on, so the leadership view does not drift from operational reality between cycles.

The AppSec champions programme is a recurring meeting, a Slack channel, and a Confluence page, with no shared record of which champions cover which applications, what training they have completed, and how the central AppSec team should route findings into the champion network

Role-based access control scopes each champion to the engagement records for the applications they cover. Findings carry an owner-of-record, severity, and remediation status that the champion reads on the same record the central AppSec team operates on. The activity log records every champion-side update with the actor, the timestamp, and the action, so the central programme lead reads the champion programme state on the same record rather than chasing chat threads and inbox replies.

Audit cycles ask the AppSec programme lead for evidence that the programme is operating against ISO 27001 Annex A, SOC 2 CC7 and CC8, PCI DSS 6.3 and 6.4, NIST SSDF practices, and the OWASP ASVS verification level by application, and the team assembles parallel evidence packs from scanner output, ticket comments, threat model spreadsheets, and review notes each cycle

Compliance tracking maps the same engagement record against ISO 27001 Annex A, SOC 2 Trust Services Criteria, PCI DSS requirements, NIST SP 800-53 control families, NIST CSF 2.0 functions, NIST SSDF practices, OWASP ASVS verification levels, and OWASP SAMM practices in parallel. One mapping satisfies multiple audit packs and CSV export of findings, control status, and the activity trail is available when the auditor wants the trail in their own format.

Run the AppSec programme on one record

Engagement records per AppSec workstream, code scanning across connected repositories, authenticated DAST against pages behind the login screen, multi-framework compliance tracking that covers OWASP ASVS and OWASP SAMM, AI-assisted programme reporting, role-based access control, and an append-only activity log on a single workspace. Free plan available.

No credit card required. Free plan available forever.