Rapid 7 Integration
Introduction
The ColorTokens Security Platform (CTSP) integrates with third party (widely used) Vulnerability Management applications. This integration allows CTSP to offer customer to evaluate vulnerabilities on enforced servers and to take appropriate actions such as quarantining the application server (so as to avoid the spreading malware or viruses to other services on the network).
Rapid7 is a widely used third party vulnerability management service. This document describes the pre-requisites required for integration of CTSP with customers Rapid7 service.
The integration from CTSP is via APIs exported and publicly published by Rapid7. Rapid7 tool can be hosted on-premise or as a cloud service. The APIs exported by the two models are vastly different and hence up front information is required on the mode of operation to use the right set of APIs.
Integrations
Integration with Rapid7 On-premise Service
in this model, Rapid7 scanner is implemented on customers environment. CTSP will connect directly to Rapid7 services, and make appropriate API call to pull vulnerability information.
Prerequisites
CTSP will need, below information about the Rapid7 on-premises services:
- Rapid7 scanner’s FQDN or Public IP address and service port number
- Administrative login credentials to Rapid7 service. (username, password)
Integration with Rapid7 AWS Cloud Service
In this model, Rapid7 is hosting a SaaS platform on which customer has purchased a service of vulnerability management for their servers, and endpoints. CTSP will connect directly to the Rapid7 SaaS platform and make the appropriate API call along with the API key (provided by the SaaS customer) to provide the vulnerability service.
Prerequisites
CTSP will need below information about the Rapid7 SaaS services:
- Region (Rapid7 supports US, Europe, Canada, Australia and Japan)
- API Key of customer to access the Rapid7 cloud service
Integration Work Flow
- Tenant administrator must first add the Rapid7 configuration on the ColorToken Security Platform (CTSP). This configuration is described above in the prerequisites based on whether the tenant is connecting to an on-premise server or to the Rapid7 cloud service.
- CTSP will use the appropriate public APIs of Rapid7 to retrieve scan results for the assets that are managed by the platform. This operation will be performed once every twenty four (24) hours and will start at 1:00 AM local time (region where the cluster is deployed).
- Rapid7 scan results also can be retrieved on a demand basis if required.
- CVE-IDs and CVSS base scores of the vulnerabilities are pulled from the scan results and are made available as part of the asset page on CTSP. By design, it only lists vulnerabilities above a CVSS base score of 7.0 and above.
Usage guidelines
- Rapid7 service must be available and reachable at the time of the scan report request for CTSP to be able to retrieve the results.
- If Rapid7 service is not reachable at the time of the scan report request then CTSP will continue to show the vulnerabilities that were pulled from the previous request.
- The CTSP platform does not request the Rapid7 service to initiate a scan and hence it is important for the administrator to perform a scan operation on the customers assets prior to requesting for the report (from CTSP).
Configuration
Activate and configure Rapid7 Scanner for on-premise
You must enable using the vulnerability results of the Rapid7 scanner by integrating with the Rapid7 service.
|
Activate and configure Rapid7 Cloud Scanner
You must enable using the vulnerability results of the Rapid7 scanner by integrating with the Rapid7 service.
|
Interpret vulnerabilities data for an asset
Vulnerabilities data is displayed on the fly panels of the assets.
|
You will see the CVE IDs, CVSS scores, and the names and descriptions of the vulnerabilities on the port.
Disconnect and re-connect Rapid7 Scanner
Disconnect Rapid7 Scanner when you want to stop fetching vulnerabilities data from the Rapid7 setup temporarily.
- Go to Settings > Tools > Risk assessment tools.
- Click Configure in the Rapid7 tile.
- Click Disconnect in the fly panel.
- To re-connect CTSP with the Rapid7 setup, click Connect in the fly panel.
Fetch the latest vulnerability status from Rapid7 Scanner
To see the most recent exposure status of your assets, we recommend that you run the Rapid7 Scanner for your assets once every day before CTSP fetches vulnerability data or immediately after you make critical changes on the assets.