IBM Guardium
App Vendor: IBM Guardium
App Category: Network Security
Connector Version: 1.0.0
API Version: V10.5
Notice
This is a beta-app and the documentation is in progress.
About App
IBM Guardium prevents leaks from databases, data warehouses, and Big Data environments such as Hadoop, ensures the integrity of information, and automates compliance controls across heterogeneous environments. It protects structured and unstructured data in databases, big data environments and file systems against threats and ensures compliance. It provides a scalable platform that enables continuous monitoring of structured and unstructured data traffic as well as enforcement of policies for sensitive data access enterprise-wide.
The IBM Guardium app is configured with the Orchestrate application to perform the following actions:
Action Name | Description |
---|---|
Get Report | This action provides a list of all reports defined on the (specified) system. |
Start a Threat Scan | This action starts threat detection analytics processes to check for specific database attacks such as SQL injection and malicious stored procedures. |
Configuration Parameters
The following configuration parameters are required for the IBM Guardium app to communicate with the IBM Guardium enterprise application. The parameters can be configured by creating instances in the app.
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Base URL | Enter the base URL. Example: "http/https://ip:port/" | Text | Required | |
Access Token | Enter the access token. | Password | Required | |
TLS/SSL Verification | Specify your preference to either verify TLS/SSL or skip verification. Example: "True" | Boolean | Optional | Allowed values:
Default value:
|
Action: Get Report
This action provides a list of all reports defined on the (specified) system.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Target host | Enter the target host. value. Example: "all_managed" | Text | Required | Allowed values:
|
Example Request
[ { "target_host": "all_managed" } ]
Action: Start a Threat Scan
This action is used to start threat detection analytics processes to check for specific database attacks such as SQL injection and malicious stored procedures.
Action Input Parameters
Parameter | Description | Field Type | Required/Optional | Comments |
---|---|---|---|---|
Target host | Enter the target host. Example: "all_managed" | Text | Required | Allowed values:
|
Start time | Enter the date and start time in yyyy-mm-dd hh:mm:ss (24-hour clock) format. Example: "2021-07-04 22:35:30" | Text | Required | |
Enable for all managed units | Specify if you want to enable all threat detection scanners on all managed units. Example: "True" | Boolean | Optional | Default value:
|
Example Request
[ { "target_host": "all_managed", "start_time": "2021-07-04 22:35:30", "enable_for_all_managed_units": "True" } ]