diff --git a/ee/app/services/security/sync_license_scanning_rules_service.rb b/ee/app/services/security/sync_license_scanning_rules_service.rb
index c025afa6dd4b27e54933a6cf9429901b32950dc6..ae4a65b9fe2099e92f18d709f7c426b9107938be 100644
--- a/ee/app/services/security/sync_license_scanning_rules_service.rb
+++ b/ee/app/services/security/sync_license_scanning_rules_service.rb
@@ -36,17 +36,17 @@ def sync_license_finding_rules(merge_requests)
 
     def remove_required_license_finding_approval(merge_request)
       license_approval_rules = merge_request
-        .approval_rules
-        .report_approver
-        .license_scanning
-        .with_scan_result_policy_read
-        .including_scan_result_policy_read
+                                 .approval_rules
+                                 .report_approver
+                                 .license_scanning
+                                 .with_scan_result_policy_read
+                                 .including_scan_result_policy_read
 
       return if license_approval_rules.empty?
 
       violations = Security::SecurityOrchestrationPolicies::UpdateViolationsService.new(merge_request)
       violated_rules, unviolated_rules = license_approval_rules.partition do |rule|
-        violates_policy?(merge_request, rule)
+        violates_policy?(merge_request, rule, violations)
       end
 
       update_required_approvals(merge_request, violated_rules, unviolated_rules)
@@ -66,34 +66,48 @@ def update_required_approvals(merge_request, violated_rules, unviolated_rules)
     ##     with license type violating the policy.
     ##   - If match_on_inclusion_license is false, any detected licenses that does not match
     ##     the licenses from `license_types` should require approval
-    def violates_policy?(merge_request, rule)
+    def violates_policy?(merge_request, rule, violations)
       scan_result_policy_read = rule.scan_result_policy_read
-      check_denied_licenses = scan_result_policy_read.match_on_inclusion_license
       target_branch_report = target_branch_report(merge_request)
 
+      license_policies = license_policies(scan_result_policy_read)
+      license_ids_from_policy, license_names_from_policy = license_policy_ids_and_names(license_policies)
+      licenses_from_policy = join_ids_and_names(license_ids_from_policy, license_names_from_policy)
+
       license_ids, license_names = licenses_to_check(target_branch_report, scan_result_policy_read)
-      license_policies = project
-        .software_license_policies
-        .including_license
-        .for_scan_result_policy_read(scan_result_policy_read.id)
 
-      license_names_from_policy = license_names_from_policy(license_policies)
-      if check_denied_licenses
-        denied_licenses = license_names_from_policy
+      if scan_result_policy_read.match_on_inclusion_license
+        all_denied_licenses = licenses_from_policy
+        policy_denied_license_names = (all_denied_licenses & licenses_from_report) - license_ids_from_policy
         violates_license_policy = report.violates_for_licenses?(license_policies, license_ids, license_names)
       else
-        # when match_on_inclusion_license is false, only allowed licenses are mentioned in policy
-        denied_licenses = (license_names_from_report - license_names_from_policy).uniq
-        license_names_from_ids = license_names_from_ids(license_ids, license_names)
-        violates_license_policy = (license_names_from_ids - license_names_from_policy).present?
+        # when match_on_inclusion_license is false, only the licenses mentioned in the policy are allowed
+        all_denied_licenses = (licenses_from_report - licenses_from_policy).uniq
+        comparison_licenses = join_ids_and_names(license_ids, license_names)
+        policy_denied_license_names = (comparison_licenses - licenses_from_policy).uniq - license_ids
+        violates_license_policy = policy_denied_license_names.present?
       end
 
-      return true if scan_result_policy_read.newly_detected? &&
-        new_dependency_with_denied_license?(target_branch_report, denied_licenses)
+      # when there are no license violations, but new dependency with policy licenses is added, require approval
+      if scan_result_policy_read.newly_detected?
+        new_license_dependency_map = new_dependencies_with_denied_licenses(target_branch_report, all_denied_licenses)
+        if new_license_dependency_map.present?
+          violates_license_policy = true
+          policy_denied_license_names = new_license_dependency_map.keys.uniq
+        end
+      end
 
+      set_violation_data(violations, rule, policy_denied_license_names) if violates_license_policy
       violates_license_policy
     end
 
+    def license_policies(scan_result_policy_read)
+      project
+        .software_license_policies
+        .including_license
+        .for_scan_result_policy_read(scan_result_policy_read.id)
+    end
+
     def licenses_to_check(target_branch_report, scan_result_policy_read)
       only_newly_detected = scan_result_policy_read.license_states == [ApprovalProjectRule::NEWLY_DETECTED]
 
@@ -112,23 +126,24 @@ def licenses_to_check(target_branch_report, scan_result_policy_read)
       [license_ids, license_names]
     end
 
-    def license_names_from_policy(license_policies)
+    def license_policy_ids_and_names(license_policies)
       ids = license_policies.map(&:spdx_identifier)
       names = license_policies.map(&:name)
 
-      ids.concat(names).compact
+      [ids, names].map(&:compact)
     end
 
-    def license_names_from_ids(ids, names)
-      ids.concat(names).compact.uniq
+    def join_ids_and_names(ids, names)
+      (ids + names).compact.uniq
     end
 
-    def new_dependency_with_denied_license?(target_branch_report, denied_licenses)
-      dependencies_with_denied_licenses = report.licenses
-        .select { |license| denied_licenses.include?(license.name) || denied_licenses.include?(license.id) }
-        .flat_map(&:dependencies).map(&:name)
+    def new_dependencies_with_denied_licenses(target_branch_report, denied_licenses)
+      new_dependency_names_in_report = new_dependency_names(target_branch_report)
 
-      (dependencies_with_denied_licenses & new_dependency_names(target_branch_report)).present?
+      report.licenses
+            .select { |license| denied_licenses.include?(license.name) || denied_licenses.include?(license.id) }
+            .to_h { |license| [license.name, license.dependencies.map(&:name)] }
+            .select { |_license, dependency_names| (dependency_names & new_dependency_names_in_report).present? }
     end
 
     def target_branch_report(merge_request)
@@ -148,10 +163,10 @@ def report
     end
     strong_memoize_attr :report
 
-    def license_names_from_report
+    def licenses_from_report
       report.license_names.concat(report.licenses.filter_map(&:id)).compact.uniq
     end
-    strong_memoize_attr :license_names_from_report
+    strong_memoize_attr :licenses_from_report
 
     def log_violated_rules(merge_request, rules)
       return unless rules.any?
@@ -175,5 +190,15 @@ def log_update_approval_rule(merge_request, **attributes)
       }
       Gitlab::AppJsonLogger.info(message: 'Updating MR approval rule', **default_attributes.merge(attributes))
     end
+
+    def set_violation_data(violations, rule, policy_denied_licenses)
+      return if ::Feature.disabled?(:save_policy_violation_data, project)
+      return if policy_denied_licenses.blank?
+
+      violations.set_violation_data(
+        rule.scan_result_policy_id,
+        { violations: { licenses: policy_denied_licenses } }
+      )
+    end
   end
 end
diff --git a/ee/config/feature_flags/wip/save_policy_violation_data.yml b/ee/config/feature_flags/wip/save_policy_violation_data.yml
new file mode 100644
index 0000000000000000000000000000000000000000..5703e4ef578d63252baa5443a87f635196b63d44
--- /dev/null
+++ b/ee/config/feature_flags/wip/save_policy_violation_data.yml
@@ -0,0 +1,9 @@
+---
+name: save_policy_violation_data
+feature_issue_url: https://gitlab.com/gitlab-org/gitlab/-/issues/433390
+introduced_by_url: https://gitlab.com/gitlab-org/gitlab/-/merge_requests/144883
+rollout_issue_url:
+milestone: '16.10'
+group: group::security policies
+type: wip
+default_enabled: false
diff --git a/ee/spec/services/security/sync_license_scanning_rules_service_spec.rb b/ee/spec/services/security/sync_license_scanning_rules_service_spec.rb
index 887ce8b7e94f9df2a08a520e44a3906a9a3ddbc2..ab064a3dd9060717ae53aca9d39bb1541803a459 100644
--- a/ee/spec/services/security/sync_license_scanning_rules_service_spec.rb
+++ b/ee/spec/services/security/sync_license_scanning_rules_service_spec.rb
@@ -78,10 +78,18 @@
       let(:sbom_scanner) { instance_double('Gitlab::LicenseScanning::SbomScanner', report: target_branch_report) }
       let(:target_branch_report) { create(:ci_reports_license_scanning_report) }
 
-      let(:case5) { [['GPL v3', 'A'], ['MIT', 'B'], ['GPL v3', 'C'], ['Apache 2', 'D']] }
-      let(:case4) { [['GPL v3', 'A'], ['MIT', 'B'], ['GPL v3', 'C']] }
-      let(:case3) { [['GPL v3', 'A'], ['MIT', 'B']] }
-      let(:case2) { [['GPL v3', 'A']] }
+      let(:case5) do
+        [
+          ['GPL v3', 'GNU 3', 'A'],
+          ['MIT', 'MIT License', 'B'],
+          ['GPL v3', 'GNU 3', 'C'],
+          ['Apache 2', 'Apache License 2', 'D']
+        ]
+      end
+
+      let(:case4) { [['GPL v3', 'GNU 3', 'A'], ['MIT', 'MIT License', 'B'], ['GPL v3', 'GNU 3', 'C']] }
+      let(:case3) { [['GPL v3', 'GNU 3', 'A'], ['MIT', 'MIT License', 'B']] }
+      let(:case2) { [['GPL v3', 'GNU 3', 'A']] }
       let(:case1) { [] }
 
       context 'when target branch pipeline is empty' do
@@ -189,70 +197,119 @@
         end
       end
 
-      using RSpec::Parameterized::TableSyntax
-
-      where(:target_branch, :pipeline_branch, :states, :policy_license, :policy_state, :result) do
-        ref(:case1) | ref(:case2) | ['newly_detected'] | 'GPL v3' | :denied  | true
-        ref(:case2) | ref(:case3) | ['newly_detected'] | 'GPL v3' | :denied  | false
-        ref(:case3) | ref(:case4) | ['newly_detected'] | 'GPL v3' | :denied  | true
-        ref(:case4) | ref(:case5) | ['newly_detected'] | 'GPL v3' | :denied  | false
-        ref(:case1) | ref(:case2) | ['detected'] | 'GPL v3' | :denied  | false
-        ref(:case2) | ref(:case3) | ['detected'] | 'GPL v3' | :denied  | true
-        ref(:case3) | ref(:case4) | ['detected'] | 'GPL v3' | :denied  | true
-        ref(:case4) | ref(:case5) | ['detected'] | 'GPL v3' | :denied  | true
-
-        ref(:case1) | ref(:case2) | ['newly_detected'] | 'MIT' | :allowed  | true
-        ref(:case2) | ref(:case3) | ['newly_detected'] | 'MIT' | :allowed  | false
-        ref(:case3) | ref(:case4) | ['newly_detected'] | 'MIT' | :allowed  | true
-        ref(:case4) | ref(:case5) | ['newly_detected'] | 'MIT' | :allowed  | true
-        ref(:case1) | ref(:case2) | ['detected'] | 'MIT' | :allowed  | false
-        ref(:case2) | ref(:case3) | ['detected'] | 'MIT' | :allowed  | true
-        ref(:case3) | ref(:case4) | ['detected'] | 'MIT' | :allowed  | true
-        ref(:case4) | ref(:case5) | ['detected'] | 'MIT' | :allowed  | true
-      end
+      describe 'possible combinations' do
+        using RSpec::Parameterized::TableSyntax
+
+        where(:target_branch, :pipeline_branch, :states, :policy_license, :policy_state, :violated_license, :result) do
+          ref(:case1) | ref(:case2) | ['newly_detected'] | ['GPL v3', 'GNU 3'] | :denied | 'GNU 3' | true
+          ref(:case1) | ref(:case2) | ['newly_detected'] | [nil, 'GNU 3'] | :denied | 'GNU 3' | true
+          ref(:case2) | ref(:case3) | ['newly_detected'] | ['GPL v3', 'GNU 3'] | :denied | 'GNU 3' | false
+          ref(:case2) | ref(:case3) | ['newly_detected'] | [nil, 'GNU 3'] | :denied | 'GNU 3' | false
+          ref(:case3) | ref(:case4) | ['newly_detected'] | ['GPL v3', 'GNU 3'] | :denied | 'GNU 3' | true
+          ref(:case3) | ref(:case4) | ['newly_detected'] | [nil, 'GNU 3'] | :denied | 'GNU 3' | true
+          ref(:case4) | ref(:case5) | ['newly_detected'] | ['GPL v3', 'GNU 3'] | :denied | 'GNU 3' | false
+          ref(:case4) | ref(:case5) | ['newly_detected'] | [nil, 'GNU 3'] | :denied | 'GNU 3' | false
+          ref(:case1) | ref(:case2) | ['detected'] | ['GPL v3', 'GNU 3'] | :denied | 'GNU 3' | false
+          ref(:case1) | ref(:case2) | ['detected'] | [nil, 'GNU 3'] | :denied | 'GNU 3' | false
+          ref(:case2) | ref(:case3) | ['detected'] | ['GPL v3', 'GNU 3'] | :denied | 'GNU 3' | true
+          ref(:case2) | ref(:case3) | ['detected'] | [nil, 'GNU 3'] | :denied | 'GNU 3' | true
+          ref(:case3) | ref(:case4) | ['detected'] | ['GPL v3', 'GNU 3'] | :denied | 'GNU 3' | true
+          ref(:case3) | ref(:case4) | ['detected'] | [nil, 'GNU 3'] | :denied | 'GNU 3' | true
+          ref(:case4) | ref(:case5) | ['detected'] | ['GPL v3', 'GNU 3'] | :denied | 'GNU 3' | true
+          ref(:case4) | ref(:case5) | ['detected'] | [nil, 'GNU 3'] | :denied | 'GNU 3' | true
+
+          ref(:case1) | ref(:case2) | ['newly_detected'] | ['MIT', 'MIT License'] | :allowed | 'GNU 3' | true
+          ref(:case1) | ref(:case2) | ['newly_detected'] | [nil, 'MIT License'] | :allowed | 'GNU 3' | true
+          ref(:case2) | ref(:case3) | ['newly_detected'] | ['MIT', 'MIT License'] | :allowed | nil | false
+          ref(:case3) | ref(:case4) | ['newly_detected'] | ['MIT', 'MIT License'] | :allowed | 'GNU 3' | true
+          ref(:case3) | ref(:case4) | ['newly_detected'] | [nil, 'MIT License'] | :allowed | 'GNU 3' | true
+          ref(:case4) | ref(:case5) | ['newly_detected'] | ['MIT', 'MIT License'] | :allowed | 'Apache License 2' | true
+          ref(:case4) | ref(:case5) | ['newly_detected'] | [nil, 'MIT License'] | :allowed | 'Apache License 2' | true
+          ref(:case1) | ref(:case2) | ['detected'] | ['MIT', 'MIT License'] | :allowed | nil | false
+          ref(:case1) | ref(:case2) | ['detected'] | [nil, 'MIT License'] | :allowed | nil | false
+          ref(:case2) | ref(:case3) | ['detected'] | ['MIT', 'MIT License'] | :allowed | 'GNU 3' | true
+          ref(:case2) | ref(:case3) | ['detected'] | [nil, 'MIT License'] | :allowed | 'GNU 3' | true
+          ref(:case3) | ref(:case4) | ['detected'] | ['MIT', 'MIT License'] | :allowed | 'GNU 3' | true
+          ref(:case3) | ref(:case4) | ['detected'] | [nil, 'MIT License'] | :allowed | 'GNU 3' | true
+          ref(:case4) | ref(:case5) | ['detected'] | ['MIT', 'MIT License'] | :allowed | 'GNU 3' | true
+          ref(:case4) | ref(:case5) | ['detected'] | [nil, 'MIT License'] | :allowed | 'GNU 3' | true
+
+          # TODO: These cases fail. Related to https://gitlab.com/gitlab-org/gitlab/-/issues/438584
+          # When spdx_identifier is used in policy instead of name, match_on_inclusion_license is evaluated incorrectly
+          # ref(:case2) | ref(:case3) | ['newly_detected'] | [nil, 'MIT'] | :allowed | nil | false
+          # ref(:case2) | ref(:case2) | ['detected'] | [nil, 'GPL v3'] | :allowed | nil | false
+        end
 
-      with_them do
-        let(:match_on_inclusion_license) { policy_state == :denied }
-        let(:target_branch_report) { create(:ci_reports_license_scanning_report) }
-        let(:pipeline_report) { create(:ci_reports_license_scanning_report) }
-        let(:license_states) { states }
-        let(:license) { create(:software_license, name: policy_license) }
+        with_them do
+          let(:match_on_inclusion_license) { policy_state == :denied }
+          let(:target_branch_report) { create(:ci_reports_license_scanning_report) }
+          let(:pipeline_report) { create(:ci_reports_license_scanning_report) }
+          let(:license_states) { states }
+          let(:license) { create(:software_license, spdx_identifier: policy_license[0], name: policy_license[1]) }
 
-        before do
-          target_branch.each do |ld|
-            target_branch_report.add_license(id: nil, name: ld[0]).add_dependency(name: ld[1])
-          end
+          before do
+            target_branch.each do |ld|
+              target_branch_report.add_license(id: ld[0], name: ld[1]).add_dependency(name: ld[2])
+            end
 
-          pipeline_branch.each do |ld|
-            pipeline_report.add_license(id: nil, name: ld[0]).add_dependency(name: ld[1])
-          end
+            pipeline_branch.each do |ld|
+              pipeline_report.add_license(id: ld[0], name: ld[1]).add_dependency(name: ld[2])
+            end
 
-          create(:software_license_policy, policy_state,
-            project: project,
-            software_license: license,
-            scan_result_policy_read: scan_result_policy_read
-          )
+            create(:software_license_policy, policy_state,
+              project: project,
+              software_license: license,
+              scan_result_policy_read: scan_result_policy_read
+            )
 
-          allow(service).to receive(:report).and_return(pipeline_report)
-          allow(service).to receive(:target_branch_report).and_return(target_branch_report)
-        end
+            allow(service).to receive(:report).and_return(pipeline_report)
+            allow(service).to receive(:target_branch_report).and_return(target_branch_report)
+          end
 
-        it 'syncs approvals_required' do
-          if result
-            expect { execute }.not_to change { license_finding_rule.reload.approvals_required }
-          else
-            expect { execute }.to change { license_finding_rule.reload.approvals_required }.from(1).to(0)
+          it 'syncs approvals_required' do
+            if result
+              expect { execute }.not_to change { license_finding_rule.reload.approvals_required }
+            else
+              expect { execute }.to change { license_finding_rule.reload.approvals_required }.from(1).to(0)
+            end
           end
-        end
 
-        it 'logs only violated rules' do
-          if result
-            expect(Gitlab::AppJsonLogger).to receive(:info).with(hash_including(message: 'Updating MR approval rule'))
-          else
-            expect(Gitlab::AppJsonLogger).not_to receive(:info)
+          it 'logs only violated rules' do
+            if result
+              expect(Gitlab::AppJsonLogger).to receive(:info).with(hash_including(message: 'Updating MR approval rule'))
+            else
+              expect(Gitlab::AppJsonLogger).not_to receive(:info)
+            end
+
+            execute
           end
 
-          execute
+          describe 'violation data' do
+            it 'persists violation data' do
+              if result
+                expect { execute }.to change { scan_result_policy_read.violations.count }.by(1)
+                expect(scan_result_policy_read.violations.last.violation_data)
+                  .to eq({ 'violations' => { 'licenses' => [violated_license] } })
+              else
+                expect { execute }.not_to change { scan_result_policy_read.violations.count }
+              end
+            end
+
+            context 'when feature flag "save_policy_violation_data" is disabled' do
+              before do
+                stub_feature_flags(save_policy_violation_data: false)
+              end
+
+              it 'adds violations without data' do
+                if result
+                  expect { execute }.to change { scan_result_policy_read.violations.count }.by(1)
+                  expect(scan_result_policy_read.violations.last.violation_data).to be_nil
+                else
+                  expect { execute }.not_to change { scan_result_policy_read.violations.count }
+                end
+              end
+            end
+          end
         end
       end
     end