Prisma Cloud Application Security: How to suppress CVE findings in CICD Runs via API

Prisma Cloud Application Security: How to suppress CVE findings in CICD Runs via API

967
Created On 05/12/25 15:05 PM - Last Modified 05/14/25 17:39 PM


Objective


In this article, I intend to show the method of suppressing Prisma Cloud Application Security CVE findings seen in CICD Runs via API. 



Environment


  • Prisma Cloud
  • Checkov 
  • API Platform


Procedure


In order to suppress the desired CVE findings seen in your CICD Run via API the following Endpoint and payload can be used.

Method: Post

Endpoint: https://api.prismacloud.io/code/api/v1/suppressions/BC_VUL_2

Payload:

{
    "comment": "test123",
    "expirationTime": 0,
    "origin": "string",
    "accountIds": "org/repo",
    "suppressionType": "CvesAccounts",
    "cves": [
        "CVE-1111-1111"
    ]
}

Please note, for AccountIds portion, you need the full name of the organization and repo including the numeric values that are seen within a CICD Run. 

Example:

"accountIds": "817425256251008000_test/apitest"

When applying the suppression via API, the suppression will be reflected in the UI upon the following CICD run.

Please also note that the --use-enforcement-rules parameter would have to be included in your Checkov scans in order to see the suppression in the CLI. 



Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA1Ki000000TNBAKA4&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail