{"id":11881,"date":"2020-11-25T13:21:51","date_gmt":"2020-11-25T07:51:51","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=11881"},"modified":"2020-11-25T13:21:51","modified_gmt":"2020-11-25T07:51:51","slug":"bulwark","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/bulwark\/","title":{"rendered":"Bulwark : An Organizational Asset &#038; Vulnerability Management Tool"},"content":{"rendered":"\n<p><strong>Bulwark <\/strong>is an organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-M04ZUSuDpnY\/X7gsF04kWkI\/AAAAAAAAID8\/HXAYDutdiycocVm0hEdroiON-OOSIy02QCLcBGAsYHQ\/s1630\/Bulwark-1.gif\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Jira Integration<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-hhEnUfaTtx0\/X7gsMkKCWsI\/AAAAAAAAIEA\/W_09huAxYeQnBK9KV8kDhiJ8pejP8kIQACLcBGAsYHQ\/s1630\/Bulwark-2.gif\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background\"><strong>Note<\/strong>: Please keep in mind, this project is in early development.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Launch With Docker<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Install <a href=\"https:\/\/www.docker.com\/\">Docker<\/a><\/li><li>Create a <code>.env<\/code> file and supply the following properties:<\/li><\/ol>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\">MYSQL_DATABASE=&#8221;bulwark&#8221;<br>MYSQL_PASSWORD=&#8221;bulwark&#8221;<br>MYSQL_ROOT_PASSWORD=&#8221;bulwark&#8221;<br>MYSQL_USER=&#8221;root&#8221;<br>MYSQL_DB_CHECK=&#8221;mysql&#8221;<br>DB_PASSWORD=&#8221;bulwark&#8221;<br>DB_URL=&#8221;172.16.16.3&#8243;<br>DB_ROOT=&#8221;root&#8221;<br>DB_USERNAME=&#8221;bulwark&#8221;<br>DB_PORT=3306<br>DB_NAME=&#8221;bulwark&#8221;<br>DB_TYPE=&#8221;mysql&#8221;<br>NODE_ENV=&#8221;production&#8221;<br>DEV_URL=&#8221;http:\/\/localhost:4200&#8243;<br>PROD_URL=&#8221;http:\/\/localhost:5000&#8243;<br>JWT_KEY=&#8221;changeme&#8221;<br>JWT_REFRESH_KEY=&#8221;changeme&#8221;<br>CRYPTO_SECRET=&#8221;changeme&#8221;<br>CRYPTO_SALT=&#8221;changeme&#8221;<\/p>\n\n\n\n<p>Build and start Bulwark containers:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>docker-compose up -d <\/strong><\/p>\n\n\n\n<p>Start\/Stop Bulwark containers:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>docker-compose start <br>docker-compose stop <\/strong><\/p>\n\n\n\n<p>Remove Bulwark containers:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>docker-compose down <\/strong><\/p>\n\n\n\n<p>Bulwark will be available at <a href=\"http:\/\/localhost:5000\">localhost:5000<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Local Installation<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ git clone (url) <br>$ cd bulwark <br>$ npm install<\/strong> <\/p>\n\n\n\n<p>Run in development mode:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ npm run start:dev <\/strong><\/p>\n\n\n\n<p>Run in production mode:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ npm start <\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Environment Variables<\/strong><\/p>\n\n\n\n<p>Create a <code>.env<\/code> file on the root directory. This will be parsed with <a href=\"https:\/\/www.npmjs.com\/package\/dotenv\">dotenv<\/a> by the application.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>DB_PASSWORD<\/strong><\/code><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><code><strong>DB_PASSWORD=\"somePassword\"<\/strong><\/code><\/p>\n\n\n\n<p>Set this variable to database password<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>DB_USERNAME<\/strong><\/code><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><code><strong>DB_USERNAME=\"foobar\"<\/strong><\/code><\/p>\n\n\n\n<p>Set this variable to database user name<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>DB_URL<\/strong><\/code><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><code><strong>DB_URL=something-foo-bar.dbnet<\/strong><\/code><\/p>\n\n\n\n<p>Set this variable to database URL<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>DB_PORT<\/strong><\/code><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><code><strong>DB_PORT=3306<\/strong><\/code><\/p>\n\n\n\n<p>Set this variable to database port<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>DB_NAME<\/strong><\/code><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><code><strong>DB_NAME=\"foobar\"<\/strong><\/code><\/p>\n\n\n\n<p>Set this variable to database connection name<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>DB_TYPE<\/strong><\/code><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><code><strong>DB_TYPE=\"mysql\"<\/strong><\/code><\/p>\n\n\n\n<p>The application was developed using a MySQL database. See the <a href=\"https:\/\/github.com\/typeorm\/typeorm\/blob\/master\/docs\/connection-options.md#common-connection-options\">typeorm<\/a> documentation for more database options.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>NODE_ENV<\/strong><\/code><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><code><strong>NODE_ENV=production<\/strong><\/code><\/p>\n\n\n\n<p>Set this variable to determine node environment<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>DEV_URL=\"http:\/\/localhost:4200\"<\/strong><\/code><\/li><\/ul>\n\n\n\n<p>Only update if a different port is required<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>PROD_URL=\"http:\/\/localhost:5000\"<\/strong><\/code><\/li><\/ul>\n\n\n\n<p>Only update if a different port is required<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>JWT_KEY<\/strong><\/code><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><code><strong>JWT_KEY=\"changeMe\"<\/strong><\/code><\/p>\n\n\n\n<p>Set this variable to the JWT secret<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>JWT_REFRESH_KEY<\/strong><\/code><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><code><strong>JWT_REFRESH_KEY=\"changeMe\"<\/strong><\/code><\/p>\n\n\n\n<p>Set this variable to the refresh JWT secret<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>CRYPTO_SECRET<\/strong><\/code><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><code><strong>CRYPTO_SECRET=\"randomValue\"<\/strong><\/code><\/p>\n\n\n\n<p>Set this variable to the <a href=\"https:\/\/nodejs.org\/api\/crypto.html#crypto_crypto_scryptsync_password_salt_keylen_options\">Scrypt<\/a> password.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>CRYPTO_SALT<\/strong><\/code><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><code><strong>CRYPTO_SECRET=\"randomValue\"<\/strong><\/code><\/p>\n\n\n\n<p>Set this variable to the <a href=\"https:\/\/nodejs.org\/api\/crypto.html#crypto_crypto_scryptsync_password_salt_keylen_options\">Scrypt<\/a> salt.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Empty <code>.env<\/code> file template<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\">DB_PASSWORD=&#8221;&#8221;<br>DB_URL=&#8221;&#8221;<br>DB_USERNAME=&#8221;&#8221;<br>DB_PORT=3306<br>DB_NAME=&#8221;&#8221;<br>DB_TYPE=&#8221;&#8221;<br>NODE_ENV=&#8221;&#8221;<br>DEV_URL=&#8221;http:\/\/localhost:4200&#8243;<br>PROD_URL=&#8221;http:\/\/localhost:5000&#8243;<br>JWT_KEY=&#8221;&#8221;<br>JWT_REFRESH_KEY=&#8221;&#8221;<br>CRYPTO_SECRET=&#8221;&#8221;<br>CRYPTO_SALT=&#8221;&#8221;<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Create Initial Database Migration<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Create the initial database migration<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ npm run migration:init <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\" start=\"2\"><li>Run the initial database migration<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ npm run migration:run <\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Default Credentials<\/strong><\/p>\n\n\n\n<p>A user account is created on initial startup with the following credentials:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>email: <code>admin@example.com<\/code><\/li><li>password: <code>changeMe<\/code><\/li><\/ul>\n\n\n\n<p>Upon first login, update the default user password under the profile section.<\/p>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/softrams\/bulwark\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Bulwark is an organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports. Jira Integration Note: Please keep in mind, this project is in early development. Launch With Docker Install Docker Create a .env file and supply the following properties: MYSQL_DATABASE=&#8221;bulwark&#8221;MYSQL_PASSWORD=&#8221;bulwark&#8221;MYSQL_ROOT_PASSWORD=&#8221;bulwark&#8221;MYSQL_USER=&#8221;root&#8221;MYSQL_DB_CHECK=&#8221;mysql&#8221;DB_PASSWORD=&#8221;bulwark&#8221;DB_URL=&#8221;172.16.16.3&#8243;DB_ROOT=&#8221;root&#8221;DB_USERNAME=&#8221;bulwark&#8221;DB_PORT=3306DB_NAME=&#8221;bulwark&#8221;DB_TYPE=&#8221;mysql&#8221;NODE_ENV=&#8221;production&#8221;DEV_URL=&#8221;http:\/\/localhost:4200&#8243;PROD_URL=&#8221;http:\/\/localhost:5000&#8243;JWT_KEY=&#8221;changeme&#8221;JWT_REFRESH_KEY=&#8221;changeme&#8221;CRYPTO_SECRET=&#8221;changeme&#8221;CRYPTO_SALT=&#8221;changeme&#8221; Build and start Bulwark containers: docker-compose up -d Start\/Stop [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16611,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-ZXHNXXeIUeM\/X7grzVQoEYI\/AAAAAAAAID0\/19riPJtSOagOqWCLRdw6DREK9ZQPVEQFQCLcBGAsYHQ\/s728\/Bulwark%25281%2529.png","fifu_image_alt":"Bulwark : An Organizational Asset & Vulnerability Management Tool","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[489,3562],"class_list":["post-11881","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-bulwark","tag-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bulwark : An Organizational Asset &amp; Vulnerability Management Tool<\/title>\n<meta name=\"description\" content=\"Bulwark is an organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/bulwark\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bulwark : An Organizational Asset &amp; Vulnerability Management Tool\" \/>\n<meta property=\"og:description\" content=\"Bulwark is an organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/bulwark\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-25T07:51:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-ZXHNXXeIUeM\/X7grzVQoEYI\/AAAAAAAAID0\/19riPJtSOagOqWCLRdw6DREK9ZQPVEQFQCLcBGAsYHQ\/s728\/Bulwark%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-ZXHNXXeIUeM\/X7grzVQoEYI\/AAAAAAAAID0\/19riPJtSOagOqWCLRdw6DREK9ZQPVEQFQCLcBGAsYHQ\/s728\/Bulwark%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/bulwark\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/bulwark\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Bulwark : An Organizational Asset &#038; Vulnerability Management Tool\",\"datePublished\":\"2020-11-25T07:51:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/bulwark\/\"},\"wordCount\":364,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/bulwark\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-ZXHNXXeIUeM\/X7grzVQoEYI\/AAAAAAAAID0\/19riPJtSOagOqWCLRdw6DREK9ZQPVEQFQCLcBGAsYHQ\/s728\/Bulwark%25281%2529.png\",\"keywords\":[\"Bulwark\",\"vulnerability\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/bulwark\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/bulwark\/\",\"name\":\"Bulwark : An Organizational Asset & Vulnerability Management Tool\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/bulwark\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/bulwark\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-ZXHNXXeIUeM\/X7grzVQoEYI\/AAAAAAAAID0\/19riPJtSOagOqWCLRdw6DREK9ZQPVEQFQCLcBGAsYHQ\/s728\/Bulwark%25281%2529.png\",\"datePublished\":\"2020-11-25T07:51:51+00:00\",\"description\":\"Bulwark is an organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/bulwark\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/bulwark\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-ZXHNXXeIUeM\/X7grzVQoEYI\/AAAAAAAAID0\/19riPJtSOagOqWCLRdw6DREK9ZQPVEQFQCLcBGAsYHQ\/s728\/Bulwark%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-ZXHNXXeIUeM\/X7grzVQoEYI\/AAAAAAAAID0\/19riPJtSOagOqWCLRdw6DREK9ZQPVEQFQCLcBGAsYHQ\/s728\/Bulwark%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bulwark : An Organizational Asset & Vulnerability Management Tool","description":"Bulwark is an organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/bulwark\/","og_locale":"en_US","og_type":"article","og_title":"Bulwark : An Organizational Asset & Vulnerability Management Tool","og_description":"Bulwark is an organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.","og_url":"https:\/\/kalilinuxtutorials.com\/bulwark\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-11-25T07:51:51+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-ZXHNXXeIUeM\/X7grzVQoEYI\/AAAAAAAAID0\/19riPJtSOagOqWCLRdw6DREK9ZQPVEQFQCLcBGAsYHQ\/s728\/Bulwark%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-ZXHNXXeIUeM\/X7grzVQoEYI\/AAAAAAAAID0\/19riPJtSOagOqWCLRdw6DREK9ZQPVEQFQCLcBGAsYHQ\/s728\/Bulwark%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/bulwark\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/bulwark\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Bulwark : An Organizational Asset &#038; Vulnerability Management Tool","datePublished":"2020-11-25T07:51:51+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/bulwark\/"},"wordCount":364,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/bulwark\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-ZXHNXXeIUeM\/X7grzVQoEYI\/AAAAAAAAID0\/19riPJtSOagOqWCLRdw6DREK9ZQPVEQFQCLcBGAsYHQ\/s728\/Bulwark%25281%2529.png","keywords":["Bulwark","vulnerability"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/bulwark\/","url":"https:\/\/kalilinuxtutorials.com\/bulwark\/","name":"Bulwark : An Organizational Asset & Vulnerability Management Tool","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/bulwark\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/bulwark\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-ZXHNXXeIUeM\/X7grzVQoEYI\/AAAAAAAAID0\/19riPJtSOagOqWCLRdw6DREK9ZQPVEQFQCLcBGAsYHQ\/s728\/Bulwark%25281%2529.png","datePublished":"2020-11-25T07:51:51+00:00","description":"Bulwark is an organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/bulwark\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/bulwark\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-ZXHNXXeIUeM\/X7grzVQoEYI\/AAAAAAAAID0\/19riPJtSOagOqWCLRdw6DREK9ZQPVEQFQCLcBGAsYHQ\/s728\/Bulwark%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-ZXHNXXeIUeM\/X7grzVQoEYI\/AAAAAAAAID0\/19riPJtSOagOqWCLRdw6DREK9ZQPVEQFQCLcBGAsYHQ\/s728\/Bulwark%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-ZXHNXXeIUeM\/X7grzVQoEYI\/AAAAAAAAID0\/19riPJtSOagOqWCLRdw6DREK9ZQPVEQFQCLcBGAsYHQ\/s728\/Bulwark%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":5962,"url":"https:\/\/kalilinuxtutorials.com\/vulnwhisperer-create-actionable-data-from-your-vulnerability-scans\/","url_meta":{"origin":11881,"position":0},"title":"VulnWhisperer : Create Actionable Data From Your Vulnerability Scans","author":"R K","date":"July 29, 2019","format":false,"excerpt":"VulnWhisperer is a vulnerability management tool and report aggregator. VulnWhisperer will pull all the reports from the different Vulnerability scanners and create a file with a unique filename for each one, using that data later to sync with Jira and feed Logstash. Jira does a closed cycle full Sync with\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/zrEuTtRUfNw\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":10729,"url":"https:\/\/kalilinuxtutorials.com\/purify\/","url_meta":{"origin":11881,"position":1},"title":"Purify : All-In-One Tool For Managing Vulnerability Reports","author":"R K","date":"June 12, 2020","format":false,"excerpt":"The goal of Purify to be an easy-in-use and efficient tool to simplify a workflow of managing vulnerabilities delivered from various tools. Purify is designed to analyze the report of any tool, if the report is in JSON or XML format. This means you don't need any special plug-ins to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11661,"url":"https:\/\/kalilinuxtutorials.com\/vprioritizer\/","url_meta":{"origin":11881,"position":2},"title":"vPrioritizer : Tool To Understand The Contextualized Risk (vPRisk)","author":"R K","date":"October 15, 2020","format":false,"excerpt":"As indicated by sources like vulndb & cve, on a daily basis, approximately 50 new vulnerabilities become known to industry and it\u2019s safe to assume that count is going to increase furthermore. It\u2019s a huge number of vulnerabilities to assess and remediate effectively and quickly. So today organizations are focusing\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/P9IDpfJDoxI\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":6463,"url":"https:\/\/kalilinuxtutorials.com\/mondoo-security-vulnerability-risk-management\/","url_meta":{"origin":11881,"position":3},"title":"Mondoo : Native Security &#038; Vulnerability Risk Management","author":"R K","date":"September 10, 2019","format":false,"excerpt":"Mondoo Cloud is a native security & vulnerability risk management. Quick Start Installing Workstation export MONDOO_REGISTRATION_TOKEN='changeme' curl -sSL http:\/\/mondoo.io\/download.sh | bash Service export MONDOO_REGISTRATION_TOKEN='changeme' curl -sSL http:\/\/mondoo.io\/install.sh | bash For other installation methods, have a look at our\u00a0documentation. Run a scan: # scan a docker image from remote registry mondoo\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4556,"url":"https:\/\/kalilinuxtutorials.com\/defectdojo\/","url_meta":{"origin":11881,"position":4},"title":"Django DefectDojo : Open-Source Application Vulnerability Correlation &#038; Security Orchestration Tool","author":"R K","date":"April 11, 2019","format":false,"excerpt":"DefectDojo is a security program and vulnerability management tool. It allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers. Consolidate your findings into one source of truth with the tool. Demo Try out it in our\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31043,"url":"https:\/\/kalilinuxtutorials.com\/secusphere\/","url_meta":{"origin":11881,"position":5},"title":"SecuSphere &#8211; Revolutionizing DevSecOps For Secure Software Development","author":"Varshini","date":"October 27, 2023","format":false,"excerpt":"Welcome to SecuSphere, your one-stop solution for all DevSecOps needs. Our centralized platform is expertly designed to manage and optimize your vulnerability management, CI\/CD pipeline integration, security assessments, and DevSecOps practices. SecuSphere is a comprehensive DevSecOps platform designed to streamline and enhance your organization's security posture throughout the software development\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgDSUkqY89wsh_8FtlAis_opyiGU0Hx4RfVYIqwR32yw_7jG3ZHf3rQoMtPaTPV9tjMb7WKlnV3aCKHXWBHUE9QwG69cXflR9vRr7UcO5hJaTCUb80oFNEsl1UUyYY8W9DgPI3SNeQhiz2-MLD8BRPBOarP4S5F68_HKocol0Vz8dE6JWB8jy04T-GxV9Hb\/s16000\/Untitled%20design%20%2844%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgDSUkqY89wsh_8FtlAis_opyiGU0Hx4RfVYIqwR32yw_7jG3ZHf3rQoMtPaTPV9tjMb7WKlnV3aCKHXWBHUE9QwG69cXflR9vRr7UcO5hJaTCUb80oFNEsl1UUyYY8W9DgPI3SNeQhiz2-MLD8BRPBOarP4S5F68_HKocol0Vz8dE6JWB8jy04T-GxV9Hb\/s16000\/Untitled%20design%20%2844%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgDSUkqY89wsh_8FtlAis_opyiGU0Hx4RfVYIqwR32yw_7jG3ZHf3rQoMtPaTPV9tjMb7WKlnV3aCKHXWBHUE9QwG69cXflR9vRr7UcO5hJaTCUb80oFNEsl1UUyYY8W9DgPI3SNeQhiz2-MLD8BRPBOarP4S5F68_HKocol0Vz8dE6JWB8jy04T-GxV9Hb\/s16000\/Untitled%20design%20%2844%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgDSUkqY89wsh_8FtlAis_opyiGU0Hx4RfVYIqwR32yw_7jG3ZHf3rQoMtPaTPV9tjMb7WKlnV3aCKHXWBHUE9QwG69cXflR9vRr7UcO5hJaTCUb80oFNEsl1UUyYY8W9DgPI3SNeQhiz2-MLD8BRPBOarP4S5F68_HKocol0Vz8dE6JWB8jy04T-GxV9Hb\/s16000\/Untitled%20design%20%2844%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgDSUkqY89wsh_8FtlAis_opyiGU0Hx4RfVYIqwR32yw_7jG3ZHf3rQoMtPaTPV9tjMb7WKlnV3aCKHXWBHUE9QwG69cXflR9vRr7UcO5hJaTCUb80oFNEsl1UUyYY8W9DgPI3SNeQhiz2-MLD8BRPBOarP4S5F68_HKocol0Vz8dE6JWB8jy04T-GxV9Hb\/s16000\/Untitled%20design%20%2844%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgDSUkqY89wsh_8FtlAis_opyiGU0Hx4RfVYIqwR32yw_7jG3ZHf3rQoMtPaTPV9tjMb7WKlnV3aCKHXWBHUE9QwG69cXflR9vRr7UcO5hJaTCUb80oFNEsl1UUyYY8W9DgPI3SNeQhiz2-MLD8BRPBOarP4S5F68_HKocol0Vz8dE6JWB8jy04T-GxV9Hb\/s16000\/Untitled%20design%20%2844%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/11881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=11881"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/11881\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16611"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=11881"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=11881"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=11881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}