RBAC for STO - Role-Based Access Control
Harness STO offers granular Role-Based Access Control (RBAC) for all its resources. You can precisely control who can view, create, or manage resources across different scopes. RBAC ensures that only authorized users or teams can access or perform actions on critical resources such as Issues, Scans, Exemptions, Test Targets etc. You can configure permissions and resource groups at the Account, Organization, or Project level. For more details on general RBAC setup, refer to the Harness RBAC configuration guide. This document details about:
To assign Roles, you need Administrative privileges at the Account level (Account Admin role).
STO Resources and Role Permissions
STO resources can be managed and secured using Role-Based Access Control (RBAC). Each resource has its own set of permissions, which you assign to roles. Roles, when combined with Resource Groups, determine the access level and permissions users have within STO.
Access to STO resources depends on the scope at which a role is assigned:
- Account: Permissions apply across the entire account.
- Organization: Permissions apply to all projects within an organization.
- Project: Permissions apply only within a specific project.
STO resources are available at different scopes, and not every scope includes all resources. The table below outlines which resources are supported at each scope. Here's how it looks at the Project level.

The following table provides a detailed overview of each STO resource, its supported permissions, available scopes, and descriptions:
Resource | Permissions | Project Scope | Organization Scope | Account Scope | Description |
---|---|---|---|---|---|
Issues |
| ✅ | ✅ | ✅ | Vulnerabilities identified by security scans. Tracked at project level and viewable at higher scopes. |
Test Targets |
| ✅ | ❌ | ❌ | Artifacts or repositories configured for scanning within specific projects. |
Scans |
| ✅ | ❌ | ❌ | Security test executions within pipelines. |
Exemptions |
| ✅ | ✅ | ✅ | Requests to ignore identified vulnerabilities from policy enforcement. |
External Tickets (coming soon) |
| ✅ (planned) | ❌ (planned) | ❌ (planned) | External issue-tracker tickets linked to STO vulnerabilities (e.g., Jira). |

Permission Details
Permissions control the specific actions users can perform on STO resources:
- View: Allows users read-only access to resources.
- Create/Edit: Enables users to configure, create, or modify resources.
- Delete: Grants the ability to remove resources (where applicable).
- Approve/Reject (Exemptions only): Provides authority to approve or reject exemption requests.
Built-in STO Roles (Default Roles)
Harness includes two built-in roles specifically designed for STO use cases. Security Testing Developer and Security Testing AppSec. These roles come pre-configured with sets of permissions on STO resources to match typical developer and security team responsibilities.
Security Testing Developer
For development or DevOps engineering teams, this role allows full access except for "Delete" on external tickets and "Approve/Reject" on exemptions.

Security Testing AppSec
For security operations and application security teams, this role grants all available permissions including exemption approvals and ticket deletions.

Assign Security Testing roles: Default workflow
- Select Account/Organization/Project Settings (left menu) > Access Control.
- In the Users table, select the user profile.
- Under Role Bindings, select +Role.
- Assign the Security Testing Developer role or the Security Testing AppSec role to the user profile.
