Skip to main content

Cyware Orchestrate

IBM Guardium

App Vendor: IBM Guardium

App Category: Network Security

Connector Version: 1.0.0

API Version: V10.5

Notice

This is a beta-app and the documentation is in progress.

About App

IBM Guardium prevents leaks from databases, data warehouses, and Big Data environments such as Hadoop, ensures the integrity of information, and automates compliance controls across heterogeneous environments. It protects structured and unstructured data in databases, big data environments and file systems against threats and ensures compliance. It provides a scalable platform that enables continuous monitoring of structured and unstructured data traffic as well as enforcement of policies for sensitive data access enterprise-wide.

The IBM Guardium app is configured with the Orchestrate application to perform the following actions:

Action Name

Description

Get Report

This action provides a list of all reports defined on the (specified) system.

Start a Threat Scan

This action starts threat detection analytics processes to check for specific database attacks such as SQL injection and malicious stored procedures.

Configuration Parameters

The following configuration parameters are required for the IBM Guardium app to communicate with the IBM Guardium enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

Base URL

Enter the base URL.

Example:

"http/https://ip:port/"

Text

Required

Access Token

Enter the access token.

Password

Required

TLS/SSL Verification

Specify your preference to either verify TLS/SSL or skip verification.

Example:

"True"

Boolean

Optional

Allowed values:

  • True

  • False

Default value:

  • False

Action: Get Report

This action provides a list of all reports defined on the (specified) system.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Target host

Enter the target host. value.

Example:

"all_managed"

Text

Required

Allowed values:

  • all_managed

  • all

Example Request

[
    {
        "target_host": "all_managed"
    }
]
Action: Start a Threat Scan

This action is used to start threat detection analytics processes to check for specific database attacks such as SQL injection and malicious stored procedures.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Target host

Enter the target host.

Example:

"all_managed"

Text

Required

Allowed values:

  • all_managed

  • all

Start time

Enter the date and start time in yyyy-mm-dd hh:mm:ss (24-hour clock) format.

Example:

"2021-07-04 22:35:30"

Text

Required

Enable for all managed units

Specify if you want to enable all threat detection scanners on all managed units.

Example:

"True"

Boolean

Optional

Default value:

  • False

Example Request

[
    {
        "target_host": "all_managed",
        "start_time": "2021-07-04 22:35:30",
        "enable_for_all_managed_units": "True"
    }
]