Collect Imperva SecureSphere Management logs

Supported in:

This document explains how to ingest Imperva SecureSphere Management logs to Google Security Operations using Bindplane. The parser extracts fields from the logs in either CEF or JSON format. It uses grok patterns and key-value parsing to map raw log fields to the UDM, handling both standard CEF fields and custom JSON structures, and prioritizing JSON data if available. Imperva SecureSphere provides comprehensive web application firewall, database security, and file security capabilities for on-premises and cloud deployments.

Before you begin

Make sure you have the following prerequisites:

  • A Google SecOps instance
  • Windows 2016 or later, or a Linux host with systemd
  • If running behind a proxy, ensure firewall ports are open per the Bindplane agent requirements
  • Privileged access to the Imperva SecureSphere Management console

Get Google SecOps ingestion authentication file

  1. Sign in to the Google SecOps console.
  2. Go to SIEM Settings > Collection Agents.
  3. Download the Ingestion Authentication File. Save the file securely on the system where Bindplane will be installed.

Get Google SecOps customer ID

  1. Sign in to the Google SecOps console.
  2. Go to SIEM Settings > Profile.
  3. Copy and save the Customer IDfrom the Organization Detailssection.

Install the Bindplane agent

Windows installation

  1. Open the Command Promptor PowerShellas an administrator.
  2. Run the following command:

      msiexec 
      
     / 
     i 
      
     "https://github.com/observIQ/bindplane-agent/releases/latest/download/observiq-otel-collector.msi" 
      
     / 
     quiet 
     
    

Linux installation

  1. Open a terminal with root or sudo privileges.
  2. Run the following command:

     sudo  
    sh  
    -c  
     " 
     $( 
    curl  
    -fsSlL  
    https://github.com/observiq/bindplane-agent/releases/latest/download/install_unix.sh ) 
     " 
      
    install_unix.sh 
    

Additional installation resources

Configure the Bindplane agent to ingest Syslog and send to Google SecOps

  1. Access the configuration file:

    1. Locate the config.yaml file. Typically, it's in the /etc/bindplane-agent/ directory on Linux or in the installation directory on Windows.
    2. Open the file using a text editor (for example, nano , vi , or Notepad).
  2. Edit the config.yaml file as follows:

      receivers 
     : 
      
     udplog 
     : 
      
     # Replace the port and IP address as required 
      
     listen_address 
     : 
      
     "0.0.0.0:514" 
     exporters 
     : 
      
     chronicle/chronicle_w_labels 
     : 
      
     compression 
     : 
      
     gzip 
      
     # Adjust the path to the credentials file you downloaded in Step 1 
      
     creds_file_path 
     : 
      
     '/path/to/ingestion-authentication-file.json' 
      
     # Replace with your actual customer ID from Step 2 
      
     customer_id 
     : 
      
    < CUSTOMER_ID 
    >  
     endpoint 
     : 
      
     malachiteingestion-pa.googleapis.com 
      
     # Add optional ingestion labels for better organization 
      
     log_type 
     : 
      
     'IMPERVA_SECURESPHERE' 
      
     raw_log_field 
     : 
      
     body 
      
     ingestion_labels 
     : 
     service 
     : 
      
     pipelines 
     : 
      
     logs/source0__chronicle_w_labels-0 
     : 
      
     receivers 
     : 
      
     - 
      
     udplog 
      
     exporters 
     : 
      
     - 
      
     chronicle/chronicle_w_labels 
     
    
    • Replace the port and IP address as required in your infrastructure.
    • Replace <customer_id> with the actual customer ID.
    • Update /path/to/ingestion-authentication-file.json to the path where the authentication file was saved in the Get Google SecOps ingestion authentication file section.

Restart the Bindplane agent to apply the changes

  • To restart the Bindplane agent in Linux, run the following command:

     sudo  
    systemctl  
    restart  
    bindplane-agent 
    
  • To restart the Bindplane agent in Windows, you can either use the Servicesconsole or enter the following command:

     net stop BindPlaneAgent && net start BindPlaneAgent 
    

Configure Syslog forwarding on Imperva SecureSphere Management

  1. Sign in to the Imperva SecureSphere Management Console.
  2. Go to Configuration > Action Sets.
  3. Click Addto create a new Action Set.
  4. Provide the following configuration details:
    • Name: Enter a descriptive name (for example, Google SecOps Syslog ).

Configure Security Event Action

  1. Click Add Actionand configure:
    • Action Type: Select Syslog.
    • Host: Enter the Bindplane agent IP address.
    • Port: Enter the Bindplane agent port number (default 514 ).
    • Protocol: Select UDPor TCP.
    • Syslog Log Level: Select DEBUG.
    • Syslog Facility: Select LOCAL0.
    • Message Format: Select Gateway Log - Security Event - System Log (syslog) using CEF standard.

Configure System Event Action

  1. Click Add Actionand configure:
    • Action Type: Select System Log.
    • Host: Enter the BindPlane Agent IP address.
    • Port: Enter the BindPlane Agent port number.
    • Protocol: Select UDPor TCP.
    • Message Format: Select Log System Event to System Log (syslog) using CEF standard.

Apply Action Sets to Policies

  1. Go to Policies > Security Policies.
  2. For each relevant policy, configure Followed Actionsto use your Action Set.
  3. Go to Policies > System Events Policies.
  4. Configure system event policies to use the Action Set for comprehensive monitoring.

UDM Mapping Table

Log Field UDM Mapping Logic
action
security_result.action_details The value of the action field is assigned to the security_result.action_details field.
application-name
target.application The value of the application-name field is assigned to the target.application field.
cat
security_result.category_details The value of the cat field is assigned to the security_result.category_details field.
class
security_result.detection_fields.value The value of the class field is assigned to the value field within security_result.detection_fields . The corresponding key is "class".
collection_time.seconds
metadata.event_timestamp.seconds The value of collection_time.seconds from the raw log is used as the seconds value for the metadata.event_timestamp .
create-time
metadata.event_timestamp.seconds The value of create-time is parsed and its seconds value is used as the seconds value for the metadata.event_timestamp .
cs1
security_result.rule_name The value of the cs1 field is assigned to the security_result.rule_name field.
cs10
target.resource.attribute.labels.value The value of the cs10 field is assigned to the value field within target.resource.attribute.labels .
cs10Label
target.resource.attribute.labels.key The value of the cs10Label field is assigned to the key field within target.resource.attribute.labels .
cs11
principal.application The value of the cs11 field is assigned to the principal.application field.
cs12
security_result.description The value of the cs12 field, after removing curly braces and dollar signs, is assigned to the security_result.description field.
cs14
target.resource.attribute.labels.value The value of the cs14 field is assigned to the value field within target.resource.attribute.labels .
cs14Label
target.resource.attribute.labels.key The value of the cs14Label field is assigned to the key field within target.resource.attribute.labels .
cs15
security_result.summary The value of the cs15 field is assigned to the security_result.summary field.
cs16
principal.process.command_line The value of the cs16 field is assigned to the principal.process.command_line field.
cs17
target.resource.resource_subtype The value of the cs17 field is assigned to the target.resource.resource_subtype field.
cs2
principal.group.group_display_name The value of the cs2 field is assigned to the principal.group.group_display_name field.
cs3
principal.hostname , principal.asset.hostname The value of the cs3 field is assigned to both the principal.hostname and principal.asset.hostname fields.
cs4
target.application The value of the cs4 field is assigned to the target.application field, unless the value is "ProcessWitness".
cs5
metadata.description The value of the cs5 field is assigned to the metadata.description field.
cs6
target.resource_ancestors.name The value of the cs6 field is assigned to the target.resource_ancestors.name field.
cs7
target.resource_ancestors.resource_subtype The value of the cs7 field is assigned to the target.resource_ancestors.resource_subtype field.
cs8
target.resource.name , target.resource.resource_type The value of the cs8 field is assigned to the target.resource.name field, and the target.resource.resource_type is set to "DATABASE".
cs9
principal.user.userid The value of the cs9 field is assigned to the principal.user.userid field.
description
security_result.description The value of the description field is assigned to the security_result.description field.
dest-ip
target.ip , target.asset.ip The IP address extracted from the dest-ip field is assigned to both the target.ip and target.asset.ip fields.
dest-port
target.port The value of the dest-port field, converted to an integer, is assigned to the target.port field.
deviceExternalId
intermediary.hostname The value of the deviceExternalId field is assigned to the intermediary.hostname field.
dpt
target.port The value of the dpt field, converted to an integer, is assigned to the target.port field.
dst
target.ip , target.asset.ip The value of the dst field is assigned to both the target.ip and target.asset.ip fields.
duser
target.user.userid The value of the duser field is assigned to the target.user.userid field.
eventId
metadata.product_log_id The value of the eventId field is assigned to the metadata.product_log_id field.
gateway-name
security_result.detection_fields.value The value of the gateway-name field is assigned to the value field within security_result.detection_fields . The corresponding key is "gateway-name".
http.request.method
network.http.method The value of the http.request.method field is assigned to the network.http.method field.
http.request.user-agent
network.http.user_agent The value of the http.request.user_agent field is assigned to the network.http.user_agent field.
http.response.code
network.http.response_code The value of the http.response.code field, converted to an integer, is assigned to the network.http.response_code field.
http.session-id
network.session_id The value of the http.session-id field is assigned to the network.session_id field.
http.user-name
principal.user.userid The value of the http.user-name field, with surrounding quotes removed, is assigned to the principal.user.userid field.
log_type
metadata.log_type The value of the log_type field from the raw log is assigned to the metadata.log_type field.
mx-ip
intermediary.ip The value of the mx-ip field is assigned to the intermediary.ip field.
MxIP
intermediary.ip The value of the MxIP field is assigned to the intermediary.ip field.
OSUser
principal.user.userid The value of the OSUser field is assigned to the principal.user.userid field.
policy-name
security_result.detection_fields.value The value of the policy-name field is assigned to the value field within security_result.detection_fields . The corresponding key is "policy-name".
pquery
target.resource.name , target.process.command_line If pquery is not empty and contains the word "from", the table name is extracted and assigned to target.resource.name , target.resource.resource_type is set to "TABLE", and the entire pquery value is assigned to target.process.command_line . Otherwise, the entire pquery value is assigned to target.resource.name .
pro
security_result.description The value of the pro field is assigned to the security_result.description field.
product
metadata.product_name The value of the product field is assigned to the metadata.product_name field.
product_type
metadata.product_event_type The value of the product_type field is assigned to the metadata.product_event_type field.
protocol
network.ip_protocol If the value of the protocol field is "TCP" or "UDP", it is assigned to the network.ip_protocol field.
proto
network.ip_protocol The value of the proto field is assigned to the network.ip_protocol field.
reason
security_result.rule_name The value of the reason field is assigned to the security_result.rule_name field.
rt
metadata.event_timestamp.seconds The value of rt is parsed and its seconds value is used as the seconds value for the metadata.event_timestamp .
server-group-name
target.resource.attribute.labels.value The value of the server-group-name field is assigned to the value field within target.resource.attribute.labels . The corresponding key is "server-group-name".
server-group-simulation-mode
target.resource.attribute.labels.value The value of the server-group-simulation-mode field is assigned to the value field within target.resource.attribute.labels . The corresponding key is "server-group-simulation-mode".
service-name
target.resource.attribute.labels.value The value of the service-name field is assigned to the value field within target.resource.attribute.labels . The corresponding key is "service-name".
ServiceName
target.application If ApplicationName is not empty and ServiceName is empty, the value of ApplicationName is assigned to ServiceName . The value of ServiceName is then assigned to target.application .
severity
security_result.severity , security_result.severity_details The value of the severity field is converted to uppercase. If it's one of "LOW", "MEDIUM", "HIGH", "CRITICAL", it's assigned to security_result.severity . If it's "INFORMATIVE" or "INFO", security_result.severity is set to "INFORMATIONAL". The original value is also assigned to security_result.severity_details .
severity_data
security_result.severity The value of the severity_data field is converted to uppercase. If it's one of "HIGH", "LOW", "MEDIUM", "CRITICAL", "ERROR", "INFORMATIONAL", it's assigned to security_result.severity .
source-ip
principal.ip , principal.asset.ip The value of the source-ip field is assigned to both the principal.ip and principal.asset.ip fields.
source-port
principal.port The value of the source-port field, converted to an integer, is assigned to the principal.port field.
spt
principal.port The value of the spt field, converted to an integer, is assigned to the principal.port field.
src
principal.ip , principal.asset.ip The value of the src field is assigned to both the principal.ip and principal.asset.ip fields.
srcapp
principal.application The value of the srcapp field is assigned to the principal.application field.
srchost
principal.hostname , principal.asset.hostname The value of the srchost field is assigned to both the principal.hostname and principal.asset.hostname fields.
vendor
metadata.vendor_name The value of the vendor field is assigned to the metadata.vendor_name field.
version
metadata.product_version The value of the version field is assigned to the metadata.product_version field.
violation-id
security_result.detection_fields.value The value of the violation-id field is assigned to the value field within security_result.detection_fields . The corresponding key is "violation-id".
violation-type
security_result.detection_fields.value The value of the violation-type field is assigned to the value field within security_result.detection_fields . The corresponding key is "violation-type".

Need more help? Get answers from Community members and Google SecOps professionals.

Create a Mobile Website
View Site in Mobile | Classic
Share by: