Skip to content
Get started
  • About DefectDojo
    • About DefectDojo
    • Feature comparison
    • ❓ Frequently Asked Questions
    • ☑️ New User Checklist
    • Online Demo
  • 🔹 DefectDojo Community Edition
    • Installation
    • System Architecture
    • Configuration
    • Running in Production
  • Contributing
    • Contribute to Parsers
    • Parser Documentation Template
    • Open-Source Branching & Releases
    • Amend Documentation
  • Common Use Cases
    • Common Use Cases
  • About DefectDojo
    • About DefectDojo
    • Feature comparison
    • ❓ Frequently Asked Questions
    • ☑️ New User Checklist
    • 🎨 Pro UI Changes
    • Online Demo
  • 🔸 DefectDojo Pro (Cloud)
    • Using the Cloud Manager
    • Connectivity Troubleshooting
    • Set up an additional Cloud instance
  • 🔸 DefectDojo Pro (On-Premise)
    • Self-Hosting DefectDojo Pro
  • Common Use Cases
    • Common Use Cases
DefectDojo Documentation
DefectDojo DefectDojo | docs 2.56.2 🌈 | changelog
  • Get Started
  • Import Data
  • Triage Findings
  • Model Your Assets
  • Metrics & Reports
  • Automation
  • Issue Tracking
  • Admin
  • Supported Tools

Common Use Cases

Common Use Cases →

Use Cases and examples

DefectDojo DefectDojo

Security's secret weapon - unify & automate AppSec.
Open-source vulnerability management & DevSecOps.

Documentation
  • Get started
  • Import data
  • Supported tools
  • API
Community
  • GitHub
  • Community
  • YouTube
  • Release notes
Company
  • DefectDojo.com
  • Pricing
  • Support
Connect
© 2026 DefectDojo Inc. All rights reserved.
Built with Doks and Hugo