For platform engineering teams
who own the developer platform that security has to run on
Platform engineering teams own the internal developer platform: the golden paths, the paved roads, the CI/CD glue, the secret stores, the IaC scaffolds, and the templates that the rest of engineering deploys against. Security is one of half a dozen non-functional concerns the platform has to make easy. SecPortal pairs code scanning from the Git provider, authenticated scanning with encrypted credentials, scheduled runs, repository connections, RBAC, and an append-only activity log on one workspace, so security testing slots into the platform as a service rather than as a release-blocking checklist that engineers learn to route around.
No credit card required. Free plan available forever.
A security platform that slots into the developer platform rather than around it
Platform engineering teams own the internal developer platform: the golden paths, the paved roads, the CI/CD glue, the secret stores, the IaC scaffolds, and the templates the rest of engineering deploys against. Security is one of half a dozen non-functional concerns the platform has to make easy. Most security tools assume the platform team will carry the integration cost: write the CI job, manage the scanner credentials, build the custom dashboard, configure the per-tool access model, and answer the audit question with a spreadsheet pulled from five consoles. Every new scanner extends the platform backlog by another quarter of glue work that does not ship developer value.
SecPortal gives in-house platform engineering teams one workspace for code scans from the Git provider, authenticated scans against deployed services, external scans across the verified perimeter, scheduled runs, encrypted credentials, repository connections, role-based access, multi-factor authentication, and an append-only activity log. The platform team integrates one OAuth connection per Git provider rather than a fleet of vendor connectors, and the developer platform inherits a single security record rather than a fleet of disconnected outputs. Security testing slots into the platform as a service rather than as a release-blocking gate.
Capabilities platform engineering teams use day to day
OAuth-based repository connections, no custom CI integration
Connect GitHub, GitLab, or Bitbucket once at the workspace level and pick the repositories the platform should monitor. The platform team adopts security tooling through one OAuth flow rather than wiring custom CI jobs across every service. SAST and SCA run against connected repositories on a schedule rather than as release-blocking pipeline jobs.
Scheduled SAST and SCA on the developer platform cadence
Continuous monitoring runs daily, weekly, biweekly, or monthly schedules for code scans against connected repositories. The schedule is part of the workspace, not a fleet of cron entries on the platform team backlog. The scan diff endpoint exposes new, fixed, and unchanged findings between runs so reviewers triage deltas rather than re-reading every finding on every run.
Authenticated DAST against deployed services with encrypted credentials
Store cookie, bearer token, basic auth, or form-login credentials in the AES-256-GCM encrypted credential vault inside the workspace. Credentials are scoped to a verified domain, gated through the manage_credentials role, and every lifecycle event (created, used, rotated, revoked) lands in the activity log. CREDENTIAL_ENCRYPTION_KEY_PREVIOUS support keeps rotation a tracked operation.
External scanning across the verified perimeter
External scanning runs across 16 modules covering subdomain enumeration, ports, headers, TLS, exposed cloud storage, leaked credentials, and tech-stack fingerprinting against the verified perimeter. The platform team and the security team read attack surface from the same record rather than from a separate ASM console.
Workspace-scoped access model with MFA enforced
Role-based access control covers owner, admin, member, viewer, and billing roles. Repository connections, credentials, schedules, and finding access are gated by RBAC, not by per-tool user models. The middleware promotes sessions to AAL2 when MFA is required, so the access model is enforced rather than asserted.
Append-only activity log across the workspace
Every finding update, scan run, credential lifecycle event, repository connection change, document upload, and team change is recorded with the actor, the entity, the timestamp, and the action. Plan retention covers 30, 90, or 365 days, and CSV export keeps the trail reproducible without a multi-team excavation.
How platform teams operate security testing inside SecPortal
A developer platform that holds up under release pressure operates on a small set of disciplines. Security testing inherits each one rather than carving out a parallel operating model.
- Treat security testing as a service the developer platform exposes rather than as a release-blocking checklist that engineers learn to route around. Scheduled scans, repository connections, and the credential vault are platform primitives the rest of engineering inherits.
- Run code scans on a schedule rather than as a synchronous CI gate so the developer-experience cost is the diff review on the next cycle, not a wait-on-CI delay on every push. The scan diff endpoint surfaces deltas between runs so reviewers triage what changed.
- Store every authenticated-scan credential and scanner-related secret in the encrypted vault so cookie, bearer, basic auth, and form login credentials stop circulating in shared password managers, environment variables, and platform-owned wiki pages.
- Verify ownership of every scan target before traffic runs so the developer platform does not produce accidental scan traffic against assets the workspace does not actually own. Domain verification is a precondition the platform inherits, not a runtime check.
- Use role-based access control to scope platform engineers, application developers, security reviewers, and viewers to the access they actually need, and require multi-factor authentication so the access model is enforced rather than asserted.
- Keep an append-only activity trail so the question of who triaged what, who rotated which credential, and who changed which schedule has a single defensible answer at audit time. The trail is one record across scanner, credential, finding, and access events rather than five reconciled logs.
From verified perimeter to triaged finding, on one platform record
The platform engineering loop for security testing is verify the perimeter, connect the Git provider, store the credentials, schedule the runs, hand the workspace to security and AppSec, and operate the access model. SecPortal runs a single workflow that the platform engineer, the security engineer, the application security analyst, and the security leader can all work against without re-keying state into another tool.
- 1Open a workspace and verify the domains and the perimeter the developer platform is authorised to scan. Domain verification through DNS TXT, HTML meta tag, or .well-known file is the precondition that gates every external, authenticated, and continuous scan that follows. The platform team treats verification as a one-time setup the rest of engineering inherits.
- 2Connect GitHub, GitLab, or Bitbucket through OAuth at the workspace level. Schedule Semgrep-based SAST and dependency auditing through SCA on the repositories the platform owns or operates. Findings land on the same engagement record as authenticated DAST and external scans, so the developer platform exposes one finding queue rather than a fleet of scanner-specific dashboards.
- 3Add the credentials authenticated scans need (cookie, bearer token, basic auth, form login) to the encrypted credential vault. Credentials are scoped to a verified domain, gated through the manage_credentials permission, and every lifecycle event is captured in the activity log so rotation is a tracked operation rather than a tribal-knowledge handover from one platform engineer to another.
- 4Set scan schedules on the engagement record. Continuous monitoring runs daily, weekly, biweekly, or monthly schedules for external, authenticated, and code scans, and the scan diff endpoint surfaces new, fixed, and unchanged findings between runs. The schedule is part of the platform, not a cron file on the platform team backlog.
- 5Operate the platform under role-based access control with multi-factor authentication enforced at the workspace level. Repository connections, credentials, and schedules are workspace-scoped rather than per-engineer, so removing a team member does not break the live scan jobs the developer platform depends on.
- 6Hand security and AppSec a workspace they can run their own triage on without a custom integration. Scanner output, schedules, encrypted credentials, repository connections, RBAC, MFA, and the activity log are the same record across the platform team, the security team, and the AppSec team. The platform team stops being a permanent integration backlog for security tooling.
Where the platform engineering view connects to the rest of the workspace
Most platform teams adopt SecPortal in three phases: bring code-side scanning and the consolidated finding queue into one workspace so the developer platform exposes a single security record, layer in encrypted credentials and continuous monitoring so authenticated scans actually run on a schedule with a credential rotation story, then consolidate role-based access, multi-factor authentication, and the activity log so the platform meets the audit posture the rest of the organisation operates against. The relevant feature, workflow, and research pages explain each phase in detail.
- The Git-provider integration, the OAuth flow, and the per-repository scope live on the repository connections feature page, the SAST and SCA scanner detail on the code scanning feature page, and the scheduled runs and diff-aware regression detection on the continuous monitoring feature page.
- The encrypted credential vault, the rotation story, and the access model live on the encrypted credential storage feature page, the verification gate on the domain verification feature page, and the workspace-enforced second factor on the multi-factor authentication feature page.
- The findings repository, CVSS calibration, and the audit trail are covered on the findings management feature page, the append-only audit record on the activity log feature page, and the role-based access controls on the team management feature page.
- The scanner triage discipline lives on the scanner result triage use case, the lifecycle-layer routing on the SDLC vulnerability handoff use case, and the scheduling cadence and baseline diff guidance on the scan scheduling and baseline cadence guide.
- The deeper analysis of how the security tooling stack overlaps and where the platform team should bless one canonical scanner per weakness class is covered on the security tool coverage overlap research, the consolidation operating model on the security tool consolidation use case, and the queue-level inflow-versus-capacity frame the platform decisions roll up to on the ingest vs remediation capacity research.
For platform teams evaluating against bundled enterprise vendors
Platform teams evaluating consolidation tend to compare SecPortal against bundled enterprise vulnerability platforms, against ASPM connector aggregators, against issue trackers used as a vulnerability tool, and against open source findings hubs. The detailed side-by-side comparisons cover the operational footprint and the platform-team integration cost on each model.
- The SecPortal vs GitHub Advanced Security comparison covers a workspace-scoped engagement record versus a Git-provider-bundled scanner where authenticated DAST, external scanning, and the scanner-agnostic finding queue live in different places.
- The SecPortal vs Snyk comparison covers the platform-team trade-off between a developer-first SAST and SCA suite and a consolidated workspace where authenticated DAST, external scans, and code scans share the same finding record.
- The SecPortal vs ArmorCode comparison covers the trade-off between a connector-aggregator ASPM model and a workspace where the scanners themselves run rather than only being aggregated.
- The SecPortal vs Jira comparison covers the workspace model versus an issue tracker with a vulnerability template, where severity, evidence, retests, and OWASP mapping live on the engagement record rather than on a ticket comment trail the platform team has to maintain.
- The SecPortal vs DefectDojo comparison covers the platform-team move from a self-hosted findings hub to a managed delivery platform with authenticated scanning, encrypted credential storage, AI reporting, and a branded portal view.
SecPortal is built for platform engineering teams that want one platform for the full verify-connect-store-schedule-triage-operate loop: live findings, SAST and SCA from the Git provider, authenticated DAST against the deployed service with encrypted credentials, external scanning across the verified perimeter, scheduled runs with diff-aware regression detection, role-based access, multi-factor authentication, and an append-only activity log. Application security and security engineering get a clean signal on the services the developer platform deploys, vulnerability management gets one queue rather than five, GRC gets reproducible evidence, and the platform team stops being a permanent integration backlog for security tooling.
If your function sits closer to building security tooling itself rather than to operating the developer platform, the sister page SecPortal for security engineering teams covers scanner orchestration, scheduled SAST and SCA, authenticated DAST with encrypted credentials, RBAC, MFA, and an append-only activity log on a single workspace from the security-engineering side.
If your function sits closer to pipeline security and CI scanner integration than to platform engineering, the SecPortal for DevSecOps teams page covers SAST and SCA from the Git provider, authenticated DAST on a schedule, and the operating model that makes security testing continuous rather than release-blocking.
If your function spans cross-cutting product security review, PSIRT-style intake, and security champions inside engineering, the SecPortal for product security teams page covers SAST, SCA, authenticated DAST, security review intake, and the disclosure lifecycle on one engagement record.
If the platform team reports up to a security leader who needs the leadership view on the same record the operators run on, the SecPortal for CISOs and security leaders page covers the program-level reporting workflow that sits on top of the platform record without rebuilding a deck every quarter.
The problems you face
And how SecPortal solves each one.
Security testing arrives as a separate vendor stack with a separate identity model, separate dashboards, and separate licence agreements, and the platform team carries the cost of integrating each new scanner into the developer platform without breaking the golden path
One workspace covers SAST and SCA from Semgrep on connected repositories, authenticated DAST against deployed services, external scanning across 16 modules on the verified perimeter, scheduled runs, role-based access, multi-factor authentication, and an append-only activity log. The platform team integrates one OAuth connection per Git provider rather than a fleet of vendor connectors, and the developer platform inherits a single security record rather than a fleet of disconnected outputs.
Security tools assume the platform team will build a custom CI integration, a custom credential rotation story, and a custom dashboard, and every new tool extends the platform backlog by another quarter of integration work
Repository connections through GitHub, GitLab, or Bitbucket OAuth are workspace-scoped and require no custom CI jobs to run code scans. Continuous monitoring runs scheduled SAST and SCA on connected repositories on daily, weekly, biweekly, or monthly cadences without a pipeline integration. Authenticated DAST credentials live in the AES-256-GCM encrypted credential vault, scoped to a verified domain, with rotation captured in the activity log. The platform team adopts the security tooling without writing a custom integration layer.
The golden path that security blesses today is the back-pressure path engineers route around tomorrow because the security gate is slow, opaque, or both, and the platform team carries the developer-experience cost of the security tooling decisions
Security testing runs on schedules attached to the engagement record rather than as a synchronous release-blocking gate, so the developer-experience cost is the cadence and the diff review rather than a wait-on-CI delay. The scan diff endpoint surfaces new, fixed, and unchanged findings between runs, so the platform team and the AppSec team triage deltas rather than re-reading every finding on every run.
Credentials for authenticated scans, scanner API keys, and integration tokens accumulate in shared password managers, Vault paths owned by other teams, and forgotten environment variables, and the platform team owns the rotation story without owning the threat model
Encrypted credential storage with AES-256-GCM is workspace-scoped, gated through the manage_credentials permission, and every lifecycle event (created, used, rotated, revoked) is captured in the activity log. CREDENTIAL_ENCRYPTION_KEY_PREVIOUS support keeps rotation a tracked operation rather than a tribal-knowledge handover. The platform team can hand security a credential vault that has its own access control rather than carrying scanner secrets in the platform-owned secret store.
Scan target authorisation is enforced at the scanner-vendor layer, and the platform team gets paged when an unauthorised scan hits a target the workspace does not actually own
Domain verification through DNS TXT, HTML meta tag, or .well-known file proves ownership of every external and authenticated scan target before traffic runs. Scan authorisation is a precondition rather than a runtime check, and verified domains are the only targets external and authenticated scans can run against, so the platform team does not absorb incident response for accidental scan traffic.
The platform team gets the access-management ticket every time security wants a new scanner role, a new credential scope, or a new repository connection, and the access model fragments because every scanner has its own user model
Role-based access control covers owner, admin, member, viewer, and billing roles inside the workspace. Repository connections, credential vaults, scan schedules, and finding access are gated by RBAC rather than by per-tool user models. Removing a team member through team management revokes their access without breaking the live scan jobs, the credential vault, or the repository connections the workspace depends on.
Compliance owners ask the platform team for evidence that the security testing inside the developer platform is operating against ISO 27001 Annex A 8.8, SOC 2 CC7.1, and PCI DSS 11.3, and the platform team has to assemble the audit trail manually each cycle
The activity log records every finding update, scan run, credential lifecycle event, repository connection change, and team change with the actor, the entity, the timestamp, and the action. Plan retention covers 30, 90, or 365 days, and CSV export keeps the trail reproducible at audit time without a multi-team excavation. Compliance tracking maps findings and controls to ISO 27001, SOC 2, Cyber Essentials, PCI DSS, and NIST frameworks on the same record as the live engagement.
Security tooling decisions land on the platform team as integration tickets without business context, and the team cannot answer the procurement question of which tool the platform should bless without a coverage map and a switching-cost view
The security tooling stack lives inside the workspace as one record. Code scanning, authenticated scanning, external scanning, continuous monitoring, encrypted credential storage, repository connections, RBAC, MFA, and the activity log all share the same workspace, so the platform team and security can read coverage from the same record rather than from a procurement deck. The security tool coverage overlap research and the security tool consolidation use case cover the matrix view that anchors that decision.
Key features for you
Repository connections for SAST and SCA
Find vulnerabilities before they ship
Test web apps behind the login
Monitor continuously catch regressions early
Encrypted credential storage for authenticated scans
Every action recorded across the workspace
Collaborate across your entire team
Multi-factor authentication on every workspace
Wire security testing into the developer platform on one record
Code scans, authenticated scans, external scans, scheduled runs, encrypted credentials, RBAC, MFA, and an append-only activity log on a single workspace. Free plan available.
No credit card required. Free plan available forever.