Wählen Sie Ihre Cookie-Einstellungen aus

Wir verwenden essentielle Cookies und ähnliche Tools, die für die Bereitstellung unserer Website und Services erforderlich sind. Wir verwenden Performance-Cookies, um anonyme Statistiken zu sammeln, damit wir verstehen können, wie Kunden unsere Website nutzen, und Verbesserungen vornehmen können. Essentielle Cookies können nicht deaktiviert werden, aber Sie können auf „Anpassen“ oder „Ablehnen“ klicken, um Performance-Cookies abzulehnen.

Wenn Sie damit einverstanden sind, verwenden AWS und zugelassene Drittanbieter auch Cookies, um nützliche Features der Website bereitzustellen, Ihre Präferenzen zu speichern und relevante Inhalte, einschließlich relevanter Werbung, anzuzeigen. Um alle nicht notwendigen Cookies zu akzeptieren oder abzulehnen, klicken Sie auf „Akzeptieren“ oder „Ablehnen“. Um detailliertere Entscheidungen zu treffen, klicken Sie auf „Anpassen“.

Terminology and metrics

Fokusmodus
Terminology and metrics - Amazon CodeGuru Security
Diese Seite wurde nicht in Ihre Sprache übersetzt. Übersetzung anfragen

Amazon CodeGuru Security is in preview release and is subject to change.

Amazon CodeGuru Security is in preview release and is subject to change.

This section provides an overview of the key terminology and metrics in Amazon CodeGuru Security.

Age

The amount of time a finding is open, starting at initial detection.

Analysis type

The type of analysis performed in a scan. You can create scans that only detect security vulnerabilities, or scan for both security and quality defects in your code. For more information, see Types of code scans.

Average time to close

The average amount of time that a finding is open, from initial detection to being closed, during a particular date range.

Closed findings

Previously detected findings that CodeGuru Security no longer identifies as security vulnerabilities during a subsequent scan because the security vulnerabilities were remediated.

Closure rate

The percentage of findings that were closed during a particular date range. This number is determined by dividing the number of open findings during the date range by the number of closed findings for the same period. For example, if 8 out of 10 open findings were closed during a date range, then the closure rate is 80%.

Detector

A defined rule that CodeGuru Security uses to check your code for security vulnerabilities based on industry standards and AWS best practices. Detectors identify a type security vulnerability and are used to group findings based on these categorizations of vulnerabilities. To learn more, see the Amazon CodeGuru Detector Library.

Finding

A security vulnerability that CodeGuru Security detects during a scan.

Finding ID

A unique identifier for a finding.

Finding summary

The number of findings of each severity level that are open across all scans in an account.

Finding status

Indicates whether a finding is open or closed.

Open findings

Detected security vulnerabilities that have not been remediated and are still open. This number could include new findings from a current scan or findings that are still open from a previous scan.

Relevant CWE

The Common Weakness Enumeration, or set of software vulnerabilities with identification, mitigation, and prevention descriptions that applies to a particular detector. For more information, see Common Weakness Enumeration.

Rule ID

An identifier for the rule that generated the finding.

Scan

An analysis of a code resource by CodeGuru Security for potential security policy violations and vulnerabilities.

Scan name

The unique name that CodeGuru Security uses to track scans across multiple revisions of the same code resource. When you create a unique scan name and use it to re-run scans on updated resources, CodeGuru Security is able to provide accurate metrics for your findings.

Scan status

Indicates whether a scan is in progress, complete, or failed.

Severity

The gravity of findings that CodeGuru Security identifies, divided into critical, high, medium, low, and informational. For more information, see Severity definitions.

Vulnerability tags

Categorizations of findings by type, programming language, or other classification such as maintainability or consistency.

Vulnerability name

The categorization of a vulnerability based on the detector that generated the finding.

DatenschutzNutzungsbedingungen für die WebsiteCookie-Einstellungen
© 2025, Amazon Web Services, Inc. oder Tochtergesellschaften. Alle Rechte vorbehalten.