Integrations: A Quick Start Guide
Integrations: A Quick Start Guide
Integrations
A Quick Start Guide
Version: 2.9
2019-07-01
4 SPLUNK ................................................................................................................................................. 9
6 SERVICENOW ..................................................................................................................................... 25
7 AMAZON .............................................................................................................................................. 29
2
8 CYBERARK ......................................................................................................................................... 31
Copyright
Trademark
Outpost24® and OUTSCAN™ are trademarks of Outpost24® in Sweden and other countries.
1 Overview
Istanbul
Assets <
SERVICENOW Jakarta ✓ ✓
Findings >
Kingston
AWS
AMAZON Assets < ✓ ✓
API V1
SAML/SSO Authentication ✓ ✓
SYSLOG/ (own
Events > ✓
SYSLOG TLS implementation)
Note: The arrows represent if our platform takes the data from the integrated system as
an input or if it sends the data to the integrated system as an output.
2 Getting Started
There are two ways of launching your applications.
• From OUTSCAN
• From a HIAB
2.1 OUTSCAN
To launch the OUTSCAN application, navigate to https://outscan.outpost24.com.
Note: Use HTTPS protocol.
2.2 HIAB
To connect to a HIAB, use the assigned network address.
Note: Use HTTPS protocol.
3 Identity Provider
An Identity Provider (IDP) offers user authentication as a service. It is a trusted provider
that allows the use of single sign-on (SSO) to access other application. SSO enhances
usability by reducing password fatigue as passwords are maintained on your IDP.
Note: While reading the response from IDP during signing into our portal, we accept
signed assertions with parameters. The parameters list which your IDP is returning in
response must include your username in a parameter named UID.
Enabled: Select the Enabled checkbox to enable the protocol for single sign-on
trusting another source to login.
Get metadata1 from file: Select Identity provider’s metadata file by clicking the +
symbol beside the field. Metadata contains information such as how it works,
what type of login is acceptable and so on.
Get metadata from URL: Provide a URL from which the OUTSCAN or HIAB
(Service Provider) should fetch metadata from IDP.
1 Metadata contains information such as how it works, what type of login is acceptable etc.,
7
4 Splunk
Splunk is a software for searching, monitoring, and analyzing machine-generated big
data. Splunk captures, indexes, and correlates real-time data in a searchable repository
from which it can generate graphs, reports, alerts, dashboards, and visualizations.
A trial version of Splunk can be downloaded from the official Splunk website. It is
implemented in both OUTSCAN and HIAB and is mostly used in Event Notification
system and Audit Log.
Note: Splunk is integrated with both HIAB and OUTSCAN. This guide describes the
integration from a HIAB, but the procedure is the same for OUTSCAN.
4.1 Requirements
To set up the HIAB/Splunk integration, it is recommended to create a new user with
limited access rights and a separate Splunk index for the data sent from the HIAB to
Splunk. A Splunk index is a repository for data in Splunk which reside in flat files on the
Splunk instance.
4.1.1 Prerequisites
To set up the HIAB/OUTSCAN-Splunk integration in TCP mode, it requires index, role,
and user be already set up in Splunk.
Tip: It is recommended to create a new user with limited access rights and a separate
Splunk index for the data sent from the HIAB to Splunk.
► It is important that the index exists before defining a role for the HIAB access.
Otherwise, the restricted access cannot be setup for the specific index. If an index
has already been setup, skip to section Create a Role.
► The HTTP Event-Collector does not require users and roles to be set up in Splunk
since it uses an access token. However, an index is required for the HTTP Event-
Collector. If an index has already been setup, skip to section Create an HTTP Event
Collector.
A Splunk index is a repository for data in Splunk which reside in flat files on the Splunk
instance.
Go to Settings on the top left menu and then click on Indexes in the DATA group.
10
11
Click Save.
The new index has been added to the list.
12
Create a role in Splunk according to the HIAB Integration Mode you want to use.
a. Create a role in Splunk and specify the following parameter for a TCP
Integration. See Mode option in the HIAB Integrations Settings table.
Parameter Value
Name hiab-tcp-indexer
Capabilities edit_tcp
13
Parameter Value
Indexes Searched
Hiab
by default
Indexes Hiab
14
15
Procedure In HIAB/OUTSCAN
Fill in the Integration settings as shown in the HIAB Integrations Settings table.
Click the Save button.
Click the Status button in the lower right corner to test the setup to Splunk.
The HIAB should now show pass, indicating a successful setup of the HIAB Integration
with Splunk.
Note: The newly setup account only has access through the API and is only able to
interact with the HIAB index, restricting its access.
16
Click HTTP Event Collector in the HTTP Event Collector row of the table.
Click the Global Settings button on the top right of the menu.
17
Select the HIAB index that was created in Creating Index section at the beginning of
the configuration.
18
Do not forget to register the Token Value given after submitting the configuration.
19
Integrations Settings
Option Value
Mode
► HTTP Event Collector - When selected, username and password is
not available.
► TCP - When selected, username and password fields are enabled.
Token HTTP Event Collector (HEC) tokens. HEC tokens are sent in the headers
of the sent data packets to authenticate them with Splunk.
Index If the user enters an index that does not exists, it will create a new one.
All events will be prefixed with the index name.
Send audit log Check this box to send audit log entries to Splunk.
(HIAB only)
The HIAB should now show pass, indicating a successful setup of the HIAB Integration
with Splunk.
20
Note: The newly setup account only has access through the API and is only able to
interact with the index, restricting its access.
Tip: You can now choose to send notifications related to Findings only in CIM format.
21
5 Atlassian Jira
Jira is a ticketing system which is implemented in both OUTSCAN and HIAB. It can be
used in many ways and has different projects to organize the various usages. Tickets
(issues) can be created with an assignee who is responsible for getting it done and a
reporter who created it. When Jira is enabled, it will be visible as a ticket system, both in
Assign Task and Event Notifications.
Note: A linked issue can be created between projects or sub-tasks if it is a bigger task.
The Jira instance must be running HTTPS.
It is important that no custom fields are set up to be required, since nor the HIAB or
OUTSCAN does provide information for those fields.
5.1.2 Setting Up
To set up JIRA:
Download the HTTPS certificate from your Jira server.
Go to Main Menu > Settings > Integrations.
Select the Jira tab.
22
Option Description
URI Provide the URI of Jira server (only https protocol is supported).
Project Key Provide the project key from the Jira instance to use.
Issue Type Jira can be used to track different types of issue. The common
Issue types used are Bug, Epic, and Story.
Link old issues Enable this feature if you want to link old issues. It is useful when
you regenerate tickets for similar issue.
Certificate uploaded Displays Yes if a certificate has been uploaded and No if there is
no certificate available.
Reset Click Reset to fully remove the current settings. It will disable the
integration and it does not have to be done after you have
disabled it since you might want to use the same settings again.
Note: The user should have permission to read issues and to create new issues.
If you scan a lot of targets, it is recommended to have a separate Jira project for these
tickets, since they can easily reach high in numbers. Every new finding can create one or
more new tickets in your Jira server.
23
5.2.2 Method 2:
Go to PCI scanning → Reports.
Right click on a finding, select Assign task.
Select Jira in the ticket system drop-down menu.
Click Save to create a ticket.
5.2.3 Method 3:
Go to Event Notifications.
Click +New.
Select Jira in the Action drop-down menu.
Note: This action is only available for Finding Information, Low Risk, Medium Risk
and High Risk.
Click Save to create tickets whenever a report is created with findings of the type of
the event.
24
6 ServiceNow
ServiceNow is a cloud service that can handle many different needs within a company.
Some of its features are:
► Ticket system
► CMDB
► Discovery server
► Security management
When ServiceNow is enabled, it will be visible as a ticket system in Assign Task, and
Event Notifications. It also adds an option of importing targets from ServiceNow and
activating events and tools for adding tickets. If you disable ServiceNow, the targets will
no longer update or scan via ServiceNow until you enable it again.
Ticket system:
A ServiceNow ticket created for a finding will be added as an Incident with target and
script information and solution to the finding will be added as Problem. Synchronization
between ServiceNow and OUTSCAN/HIAB is periodic. This may cause some delay in
the update. With the ticket system, we recommend using old scans to add tickets that
you want to get started and then add the events you want for future scans.
When completed, fill in the Client ID and Client secret (if used) in the Integrations
window.
25
Option Description
Add finding solution Click on this field to view the finding solutions under
as problem Problems in ServiceNow.
App integration (If used) Click on this field to enable ServiceNow app
enabled integration.
App granted hosts (If used) Add an IP range to restrict the access.
26
After enabling ServiceNow, use any of the following ways to create a ticket:
6.1.2 Method 1:
Go to Main Menu → Netsec → Reporting Tools → Findings.
Right click on any finding, select Assign task.
6.1.3 Method 2:
Go to PCI scanning → Reports.
Right click on a finding, select Assign task.
Select ServiceNow in the ticket system drop-down menu.
Click Save to create a ticket.
6.1.4 Method 3:
Go to Event Notifications.
Click +New.
Select ServiceNow in the Action drop-down menu.
Note: This action is only available for Information, Low Risk, Medium Risk, and
High-Risk findings.
Click Save to create tickets whenever a report is created with findings of the type of
the event.
27
6.1.5 Incident
In ServiceNow a ticket is called an incident, when a scan encounters a finding, it creates
a ticket that ends up in Incident → Open.
28
7 Amazon
Here you can set up to run scans against instances in the Amazon cloud. It will also
enable the option to run discovery scans using ARNs added in this setup. Amazon
service is implemented in both OUTSCAN and HIAB.
Note: Amazon targets can only be added to OUTSCAN/HIAB via discovery scans. Only
OUTSCAN is Whitelisted by Amazon as an authorized scanner and scanning from HIAB
may require additional authorization from Amazon.
29
Apply IAM policy given below for the role on Amazon cloud to grant access to the
targets.
{
"Version": "2012-10-17",
"Statement": [{
"Sid": "Stmt1400711494000",
"Effect": "Allow",
"Action": [
"ec2:DescribeInstances",
"ec2:DescribeRegions",
"elasticloadbalancing:DescribeLoadBalancers",
"elasticloadbalancing:DescribeTargetGroups",
"elasticloadbalancing:DescribeTargetHealth"
],
"Resource": ["*"]
}]
}
Note: Any role which gives you read-only access to the required Actions listed in the
policy will work.
Enter the Amazon Resource Name (ARN) for the newly created role in the table
using + New button.
Click Save to save the current settings.
30
8 CyberArk
Note: CyberArk is supported in HIAB and OUTSCAN for both internal and external IP
addresses.
Note: CyberArk authentication cannot be configured on the policy level, only on the
target level.
31
Option Description
Default safe Provide a safe name in which you would like to store the password.
Click Save.
32
Option Description
33
► Authentication against the system with the purpose of user management, allowing
organizational memberships or attributes from the AD dictate access in the HIAB.
► Discovery scanning, implying that devices added in the active directory can be added
as devices to the HIAB for scanning purposes.
34
The system allows you to define both Primary Server and a Failover Server.
The Failover Server will be accessed if the Primary Server is unavailable when
required. The following options are available for both Primary and Failover Server.
Option Description
Server Define the network location of the LDAP or Active Directory server.
Port Displays the default port used by LDAP or AD server when TLS
encryption is enabled.
Use TLS Encryption Must be checked if the server use TLS (Transport Layer Security)
during the connection phase.
Note: If you have an Active Directory server, then you should also
provide the Domain in a simple form like "ad.local". This will be used
when we supply the username in the authentication process against
the active directory server.
Bind Password Supply the Bind Password for the above domain name.
Test LDAP/AD Once all the required settings are supplied, check the
configuration by pressing Test LDAP/AD button for respective
section.
Import and specific mapping settings for the user and target integration are located under
respective settings sections.
35
Provide the LDAP server attribute names that corresponds to the fields mentioned below.
Option Description
Provide the LDAP server attribute names that corresponds to the fields mentioned below.
Option Description
36
LDAP/AD Configuration
Option Description
Enter the base domain name. This is used only when importing
Base DN (Users)
users.
Enter the base domain name. This is used to import user groups
Base DN (Groups)
when a user is authenticated.
Enter the base domain name. This is used only when importing
Base DN (Targets)
targets.
User Roles
The User Roles section allows you to define if roles should automatically be assigned to
imported user, based on already defined group belongings in the LDAP/AD tree. If
enabled, you can define a matching field on each user role in the HIAB. If they match,
that user role is then automatically assigned to the imported user. The matching field is
present in the Maintaining User Role section when you edit or create a new role.
Example:
37
If the text is marked red as above, it implies that the user details either does not contain
all required fields or it has content which is not allowed to use. Grey text indicates that
the user already exists in the system.
A user is valid if the following criteria are fulfilled:
Note: Do not use any comma sign in any of the above inputs as it is interpreted as a
comma separation.
Note: If the country is omitted or not available, then it is set to the country of the logged
in user. The country is used when selecting the time zone for the user so that the time is
reported correctly in the GUI.
38
The Parent Account setting allows you to import users in different levels if required.
Note: Only 10 groups are visible when doing the test authentication.
Here, you can view the different values for the user along with the defined groups
associated with him/her.
39
This opens a new window where you can filter which targets to import into the system. If
the line is marked red then the target details either does not contain all required fields, or
it has content that is not allowed to use.
40
► IP address or hostname.
► MAC address is formatted correctly. If applicable.
If Update existing targets checkbox is ticked, the Import updates the available targets.
The Scanner option is only available if you have a distributed environment (multiple HIAB
instances connected) and it determines which scanner will execute the scans against
those targets associated with it.
41
Option Description
Prefix Enter any word that you want to add as a prefix for each line.
42
Option Description
TLS Click on this field to encrypt data. Use secure transport layer.
Certificate Upload the certificate for the syslog server. Only needed if TLS is
enabled.
43
Click Save.
When ArcSight is enabled, the Syslog message is built differently to fit into the ArcSight
protocol.
The Syslog message is sent to the ArcSight logger or the connector. When the logger
shows the message, it is divided into columns that is easier to work with than the raw
data.
Note: No ArcSight specific errors should occur. If the ArcSight server has errors it is due
to the Syslog implementation, not the ArcSight implementation.
44
It is recommended that the customer uses ArcSight together with TLS. If the logger
cannot work with the TLS messages, a connector is recommended to be able to do so.
There is no maintenance needed for ArcSight, but the logger or the Syslog settings must
be updated if IP numbers or other information are switched.
Examples:
A Syslog Message
Risk: Script Name: "Unencrypted Remote Authentication Available -
POP3" Script Id: "219784" Target: "192.168.202.6" Port: "110"
BugTraq: "No bugtraq" CVSS: "6.8" New: "0" CVE: "No CVE" Family:
"pop3" First Seen: "2016-11-21 11:08" Last Seen: "2016-11-24
18:06" Product: "Unencrypted Remote Authentication" Has Exploits:
"false" – Medium
An ArcSight message
dvc=192.168.202.6 spt=110 cs1Label=Script Name cs1=Unencrypted
Remote Authentication Available - POP3 cs4Label=BugTraq cs4=No
bugtraq cs2Label=CVE cs2=No CVE deviceCustomDate1Label=First Seen
deviceCustomDate1=Nov 21 2016 11:08:00
deviceCustomDate2Label=Last Seen deviceCustomDate2=Nov 24 2016
18:08:00 msg=Script Id: 219784 New: 0 Family: pop3 Product:
Unencrypted Remote Authentication Has Exploits: false
45
HIABs can pass events via SNMP and integrate into SIEM/Log management solutions.
Option Description
Version Select either 2 or 3 depending on the SNMP version you are using.
Prefix Enter any word that you want to add as a prefix for each line.
46
However, HIAB can be configured to set up a database connector and export findings
data to external databases using Events or Report Schedules. Then, you may run your
analysis or integrate external products/solutions to the external database.
When connecting to the database, you must have permissions to create tables as well as
updating data.
► MS SQL
► MySQL
► PostgreSQL
47
Option Description
Database Name Provide database name of external database server to which findings
data should be exported.
Table Name Provide a valid name for table in the database. A new table is auto
created during HIAB - DB integration process.
You can use any special character supported by ascii, depending on
the type of database.
48