Google Security Operations (SecOps) (Chronicle) Integration with Zero Trust Alarms
- Overview
- Support Statement
- Limitations
- Solution Overview
- Advanced Zero Trust Capabilities
- What is Google Security Operations (SecOps) (Chronicle) SIEM?
- Integration Architecture
- Solution Configuration in Google Security Operations (SecOps) (Chronicle) SIEM and Defender Zero Trust
- Prerequisites
- Configuration in Google Security Operations (SecOps) (Chronicle) SIEM
- Configuration Steps on Eyeglass Virtual Machine
- High Level steps
- Configuration Step by Step
- Configure the Service start and python integration files
- Configure the python packages and customize the gcsiem integration python code
- Configure Defender Zero Trust Webhooks
- How to test the Integration with Google Security Operations (SecOps) (Chronicle) SIEM
- Google Security Operations (SecOps) (Chronicle) SIEM SecOps administrators Integration Experience
Overview
Customers using Google Security Operations (SecOps) (Chronicle) SIEM solution can now leverage a native integration that initiates native ingestion API alerts from Security Editions zero trust alerts. Customers can augment the capabilities of Google Security Operations (SecOps) (Chronicle) SIEM with threat intelligence and Cyber Storage capabilities of Superna Security Edition.
Support Statement
-
NOTE: This documentation is provided "as is" without support for 3rd party software. The level of support for this integration guide is best effort without any SLA on response time. No 3rd party product support can be provided by Superna directly. 3rd party components require support contracts
Limitations
- None
Solution Overview
Superna Defender Zero Trust API receives webhook alerts and parses the key data that can be used in native Google Security Operations (SecOps) (Chronicle) ingestion API event creation. The Chronicle platform uses the UDM (Unified Data Model) schema for events. You can read more about the fields that are available here. The Superna integration maps key zero trust cyber storage fields into the UDM format and creates event streams that custom alert rules can read to create alerts and IOC's.
Advanced Zero Trust Capabilities
- Custom UDM mapping from Cyber Storage to UDM event format
- Custom alert rule to scan events and generate actionable events in Chronicle.
What is Google Security Operations (SecOps) (Chronicle) SIEM?
Chronicle SIEM is a cloud service, built as a specialized layer on top of core Google infrastructure, designed for enterprises to privately retain, analyze, and search the massive amounts of security and network telemetry they generate.
Integration Architecture
Solution Configuration in Google Security Operations (SecOps) (Chronicle) SIEM and Defender Zero Trust
Prerequisites
- Installed Security Edition
- Eyeglass OS appliance version 15.5
- cat /etc/os-release
- License key for the Zero Trust API
- Google Security Operations (SecOps) (Chronicle) SIEM
- Ingestion API permissions enabled in your account. This requires your account representative to create json authentication file that is required to authenticate to API endpoints and use the Ingestion API (documented here as a reference)
- customer ID - This value can be found in the console settings. This string is required to use the ingestion api and will be used below.
Configuration in Google Security Operations (SecOps) (Chronicle) SIEM
- Login to Google Security Operations (SecOps) (Chronicle) and record the customer ID value.
- Get the authentication json file from your Google account team.
- Create a custom detection rule by using the example YARA-l language rule provided by Superna.
- Open the Detection menu and then the Rules & Detections
- Select the rules editor
- Click the New button and paste the contents of the custom rule file downloaded in the step above and then Save the rule.
- Click the 3 dots to enable the rule for live events and alerting as well as setting the run frequency to 10 minutes.
- Done
- The next step is implementing the integration code and modifying it for your environment followed by testing and alert validations.
- done.
Configuration Steps on Eyeglass Virtual Machine
High Level steps
- Create python location to run the application on the Eyeglass vm
- Create python main application script
- Create linux systemd service and set to auto start
- Create Zero Trust configuration in Defender
- Update the main script to customize with Google Security Operations (SecOps) (Chronicle) SIEM python code
- Test the script is running as a service
- Create a test event in Defender to validate the alerts appear as indexed parsed events in Google Security Operations (SecOps) (Chronicle) SIEM
Configuration Step by Step
Configure the Service start and python integration files
-
Login to eyeglass vm using ssh as the admin user to create zero trust application
- sudo -s
- mkdir -p /opt/superna/cgi-bin
- touch /opt/superna/cgi-bin/gcsiem.py
- touch /opt/superna/cgi-bin/gcsiem.sh
- chown sca:users /opt/superna/cgi-bin/gcsiem.*
- chmod +x /opt/superna/cgi-bin/gcsiem.py
- chmod +x /opt/superna/cgi-bin/gcsiem.sh
-
Create systemd configuration
- nano /etc/systemd/system/gcsiem.service
- Copy the values below and Paste these contents into the file opened in nano editor in the step above
- Save the file
- press control+x
- Answer yes to save and exit
- Restart systemd
- systemctl daemon-reload
- Set to enabled
- systemctl enable gcsiem
- Create gcsiem.sh service script
- Copy the values below
- nano /opt/superna/cgi-bin/gcsiem.sh
- paste the script values below into the nano editor
- Save the file
- press control+x
- Answer yes to save and exit the editor
- Once the script is created below, do not start the service at this step.
- Done
copy for bash script
Configure the python packages and customize the gcsiem integration python code
-
Now install required python packages for the SCA users that will run the service. NOTE this is the same user that runs the main eyeglass application code.
- su - sca
- pip3 install google-auth google-auth-httplib2 google-api-python-client flask boto3 requests logging
- exit
- NOTE: you must type exit to ensure you are the root user for the remaining steps. Type whoami to make sure you are the root user.
- Customize the application code by downloading the python code from this link to download
- Open the python template file in a text editor. NOTE: make sure to only replace the values and do not delete any of the commas
- Locate this section in the file and replace the yellow sections with the api token saved above.
- Section named "Google Security Operations (SecOps) (Chronicle) SIEM Integration section" in the downloaded python template code above.
- Replace the yellow key file name provided by your Google rep.
- Make sure to copy the json file provided by Google to this path /opt/superna/cgi-bin
- Now search the template file for the customer_id string and replace with your customer id from the Chronicle portal.
- save the changes to the template python script code.
- nano /opt/superna/cgi-bin/gcsiem.py
- Open the file locally in Windows OS notepad and use control-A or select all the text in the python template
- Paste the clipboard into the ssh terminal session with the open nano editor file
- save the file
- press control+x
- Answer yes to save and exit the nano editor
- Start the service and verify it is running
- systemctl start gcsiem
- systemctl status -l gcsiem
- Verify the service is started successfully and returns "active and running".
- If the service does not start do not proceed and double check the steps above are completed.
Configure Defender Zero Trust Webhooks
- The next step creates an Zero Trust Webhook URL.
- Configure Zero Trust endpoint in Ransomware Defender Zero Trust tab.
- Recommended Configuration: Only Critical and Major events and only the webhooks that set lockout or delayed lockout. Customers can customize based on specific requirements. The goal is to send findings versus a list of alarms that do not pinpoint a security incident.
- The endpoint url above will use localhost and will send Webhooks to the application service listening on port 5000. URL to use in the configuration
- http://localhost:5000/webhook
- Add the Content-Type header with value of application/json as shown above to complete the webhook configuration.
- Click save to commit the configuration.
- Click save on the main Webhook configuration page
- Configure Zero Trust endpoint in Ransomware Defender Zero Trust tab.
- Test the configuration is working following the next section
How to test the Integration with Google Security Operations (SecOps) (Chronicle) SIEM
- To test the integration follow these steps
- Prerequisites In Google Security Operations (SecOps) (Chronicle) SIEM and Eyeglass:
- install the Google Security Operations (SecOps) (Chronicle) SIEM agent on a test machine. Record the ip address of this test machine.
- Get the ip address of the Eyeglass vm
- download this curl command template and open with a text editor and locate the ip address of eyeglass at the very end of text and replace the ip address with the IP address of your eyeglass vm.
- Also edit the client ip section of the curl command by searching the text clientIPs":["172.31.1.45"] and replace only the ip address with the IP of the test machine running the Google Security Operations (SecOps) (Chronicle) SIEM agent.
- This will now simulate a zero trust alert on this host when the curl command sends the webhook payload to the integration python code to process.
- Copy all the text in the text editor
- ssh to the eyeglass vm as the admin user
- Paste the entire cli command text to the ssh prompt to send sample data to the running Zero Trust application. This will send test data directly to the application to be processed and sent to Google Security Operations (SecOps) (Chronicle) SIEM Integration service that is running on the Eyeglass VM.
- The output of a successfully processed webhook test will return this text in the ssh terminal
- done sending event to gcsiem and check for http 200 and success count in response
- How to review the process logs from the web application
- sudo -s
- journalctl -f -u gcsiem
- This allows you to view the logs generated by the application.
- To log to a file and review with nano showing only the most recent 250 lines.
- journalctl -f -n 250 -u gcsiem > /tmp/ztwebhook.log
- nano /tmp/gcsiem.log
- In the log below the response code from the Google Security Operations (SecOps) (Chronicle) SIEM api call should show http 200 status code and successCount 1 to indicate the Finding was successfully created.
- You can also view gcsiemd.log for specific error messages.
- Login to the Google Security Operations (SecOps) (Chronicle) SIEM Main Dashboard to check the Alerts landing page. See screenshot example below. NOTE: The Alert policy takes 10 minutes to scan for events that match.
- Done
Google Security Operations (SecOps) (Chronicle) SIEM SecOps administrators Integration Experience
- Watch the video summary.
- Once the integration has been configured and is running security administrators can see the details of the events ingested by the Ingestion API.