Integrate Cisco Vulnerability Management with Google SecOps

This document describes how to integrate Cisco Vulnerability Management with Google Security Operations (Google SecOps).

Integration version: 1.0

Use Cases

Get the contextual insight and threat intelligence needed to intercept the next exploit and respond with precision.

Integration parameters

Use the following parameters to configure the integration:

Parameter name Type Default value Is mandatory Description
API Root String Yes The API Root of the Cisco Vulnerability Management integration.
API Token Password Yes The API Token of the Cisco Vulnerability Management integration.
Verify SSL bool Checked Yes If selected, the integration validates the SSL certificate when connecting to Cisco Vulnerability Management. Selected by default.

For instructions about how to configure an integration in Google SecOps, see Configure integrations.

You can make changes at a later stage, if needed. After you configure an integration instance, you can use it in playbooks. For more information about how to configure and support multiple instances, see Supporting multiple instances.

Actions

For more information about actions, see Respond to pending actions from Your Workdesk and Perform a manual action.

Ping

Test the connectivity to Cisco Vulnerability Management.

Parameters

N/A

Run on

The action does not use entities, nor has mandatory input parameters.

Action results

Script result
Script result name Value options Example
is_success True/False is_success:False
Case wall
Result type Description Type
Output message* The action should not fail nor stop a playbook execution:
If successful:
print "Successfully connected to the Cisco Vulnerability Management server with the provided connection parameters!"

The action should fail and stop a playbook execution:
If not successful:
print "Failed to connect to the Cisco Vulnerability Management server! Error is {0}".format(exception.stacktrace)
General

Enrich Entities

Enrich entities using information from Cisco Vulnerability Management.

Parameters

Parameter name Type Default value Is mandatory Description
External ID CSV No Comma-separated list of external IDs associated with an asset. Assets searched by external ID will be searched in parallel to entities.

Run on

This action runs on the following entities:

  • CVE
  • IP Address
  • Hostname

Action results

Script result
Script result name Value options Example
is_success True/False is_success:False
JSON result
{
   "Entity": "Entity",
   "EntityResult":
       {
           "id": 1177,
           "status": "open",
           "closed_at": null,
           "created_at": "2025-02-06T09:00:16Z",
           "due_date": "2024-09-03",
           "notes": "Unknown",
           "port": [],
           "priority": 10,
           "identifiers": [
               "CVE-2024-38107"
           ],
           "last_seen_time": "2025-02-06T08:59:24.000Z",
           "scanner_score": null,
           "fix_id": 2692956,
           "scanner_vulnerabilities": [
               {
                   "port": null,
                   "external_unique_id": "CVE-2024-38107",
                   "open": true
               }
           ],
           "asset_id": 101,
           "connectors": [
               {
                   "id": 160084,
                   "name": "Custom CSV",
                   "connector_definition_name": "Custom CSV",
                   "vendor": "Cisco"
               }
           ],
           "service_ticket": null,
           "urls": {
               "asset": "api.trial1.eu.kennasecurity.com/assets/101"
           },
           "solution": "The following products are affected by this vulnerability:<ul><li><i>Operating System</i> <b>microsoft windows_10_1507</b></li><li><i>Operating System</i> <b>microsoft windows_10_1607</b></li><li><i>Operating System</i> <b>microsoft windows_10_1809</b></li><li><i>Operating System</i> <b>microsoft windows_10_21h2</b></li><li><i>Operating System</i> <b>microsoft windows_10_22h2</b></li><li><i>Operating System</i> <b>microsoft windows_11_21h2</b></li><li><i>Operating System</i> <b>microsoft windows_11_22h2</b></li><li><i>Operating System</i> <b>microsoft windows_11_23h2</b></li><li><i>Operating System</i> <b>microsoft windows_11_24h2</b></li><li><i>Operating System</i> <b>microsoft windows_server_2012</b></li><li><i>Operating System</i> <b>microsoft windows_server_2016</b></li><li><i>Operating System</i> <b>microsoft windows_server_2019</b></li><li><i>Operating System</i> <b>microsoft windows_server_2022</b></li><li><i>Operating System</i> <b>microsoft windows_server_2022_23h2</b></li></ul>The following remediations or software updates can fix your system:<ul><li><b>windows_11_24h2</b> version needs to be updated to version 10.0.26100.1457 or greater.</li><li><b>windows_server_2022_23h2</b> version needs to be updated to version 10.0.25398.1085 or greater.</li><li><b>Windows 10 Version 20H2 Build 10240</b> needs to be patched with: <a href=\"https://support.microsoft.com/en-in/help/5041782\">5041782</a>.</li><li><b>Windows 10 Version 1607 Build 14393</b> needs to be patched with: <a href=\"https://support.microsoft.com/en-in/help/5041773\">5041773</a>.</li><li><b>Windows 10 Version 1809 Build 17763</b> needs to be patched with: <a href=\"https://support.microsoft.com/en-in/help/5041578\">5041578</a>.</li><li><b>Windows 10 Version 21H2 Build 19044</b> needs to be patched with: <a href=\"https://support.microsoft.com/en-in/help/5041580\">5041580</a>.</li><li><b>Windows 10 Version 22H2 Build 19045</b> needs to be patched with: <a href=\"https://support.microsoft.com/en-in/help/5041580\">5041580</a>.</li><li><b>Windows 11 Version 21H2 Build 22000</b> needs to be patched with: <a href=\"https://support.microsoft.com/en-in/help/5041592\">5041592</a>.</li><li><b>Windows 11 Version 22H2 Build 22621</b> needs to be patched with: <a href=\"https://support.microsoft.com/en-in/help/5041585\">5041585</a>.</li><li><b>Windows 11 Version 23H2 Build 22631</b> needs to be patched with: <a href=\"https://support.microsoft.com/en-in/help/5041585\">5041585</a>.</li><li><b>Windows Server 2012</b> needs to be patched with: <a href=\"https://support.microsoft.com/en-in/help/5041851\">5041851</a>.</li><li><b>Windows Server 2012 R2</b> needs to be patched with: <a href=\"https://support.microsoft.com/en-in/help/5041828\">5041828</a>.</li><li><b>Windows Server 2016</b> needs to be patched with: <a href=\"https://support.microsoft.com/en-in/help/5041773\">5041773</a>.</li><li><b>Windows Server 2019</b> needs to be patched with: <a href=\"https://support.microsoft.com/en-in/help/5041578\">5041578</a>.</li><li><b>Windows Server 2022 Build 20348</b> needs to be patched with: <a href=\"https://support.microsoft.com/en-in/help/5041160\">5041160</a>.</li></ul>Refer to these referenced URL(s) for more information on remediation:<br/><ul><li><a href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107\">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107</a></li></ul>",
           "patch": true,
           "patch_published_at": "2024-08-13T18:15:10.000Z",
           "cve_id": "CVE-2024-38107",
           "cve_description": "Windows Power Dependency Coordinator Elevation of Privilege Vulnerability",
           "cve_published_at": "2024-08-13T18:15:10.000Z",
           "description": null,
           "wasc_id": null,
           "severity": 7,
           "threat": 3,
           "popular_target": false,
           "active_internet_breach": false,
           "easily_exploitable": false,
           "malware_exploitable": false,
           "remote_code_execution": false,
           "predicted_exploitable": false,
           "platform_types": [
               "operating system"
           ],
           "cvss_v2": {
               "exploit_subscore": 3.1,
               "impact_subscore": 10.0,
               "score": 6.8,
               "temporal_score": 5.6
           },
           "cvss_v3": {
               "exploit_subscore": 1.8,
               "impact_subscore": 5.9,
               "score": 7.8
           },
           "custom_fields": [],
           "first_found_on": "2024-08-13T00:00:00Z",
           "top_priority": false,
           "risk_meter_score": 28,
           "closed": false
       }

}
Entity enrichment

Prefix: CiscoVM_

Enrichment field name Logic - When to apply
priority When available in JSON
severity When available in JSON
threat When available in JSON
solution When available in JSON
patch_available When available in JSON
description When available in JSON
published_at When available in JSON
risk_score When available in JSON
Enrichment table asset

Prefix: CiscoVM_

Enrichment field name Logic - When to apply
os When available in JSON
priority When available in JSON
vulnerabilities_count When available in JSON
status When available in JSON
last_seen_time When available in JSON
tags When available in JSON
ip_address When available in JSON
hostname When available in JSON
fqdn When available in JSON
risk_score When available in JSON
asset_groups When available in JSON
Case wall
Result type Description Type
Output message* The action should not fail nor stop a playbook execution:

If data is available for one entity (is_success = true):
print "Successfully enriched the following entities in Cisco Vulnerability Management: {entity.identifier}".

If data is not available for one entity (is_success=true):
print "The action wasn't able to enrich the following entities in Cisco Vulnerability Management: {entity.identifier}"

If data is not available for all (is_success=false):
No information was found for the provided entities.

The action should fail and stop a playbook execution:

If fatal error, like wrong credentials, no connection to server, other:
print "Error executing action "Enrich Entities". Reason: {0}''.format(error.Stacktrace)
General

Update Asset

Update asset information associated with Google SecOps entities from Cisco Vulnerability Management.

Parameters

Parameter name Type Default value Is mandatory Description
External ID CSV No Comma-separated list of external IDs associated with an asset. Assets searched by external ID will be searched in parallel to entities.
Status DDL Select One

Possible values:
  • Active
  • Inactive
  • Select One
No Status for the asset.
Note String No Note for the asset.

Run on

This action runs on the following entities:

  • IP Address
  • Hostname

Action results

Script result
Script result name Value options Example
is_success True/False is_success:False

Case wall

Result type Description Type
Output message* The action should not fail nor stop a playbook execution:

If data is available for one entity (is_success = true):
print "Successfully updated the following entities in Cisco Vulnerability Management: {entity.identifier}".

If 1 entity not found (is_success=true):
print "The action wasn't able to update the following entities in Cisco Vulnerability Management: {entity.identifier}"

If data is not available for all (is_success=false):
None of the provided entities were updated.


The action should fail and stop a playbook execution:

If fatal error, like wrong credentials, no connection to server, other:
print "Error executing action "Update Asset". Reason: {0}''.format(error.Stacktrace)
General

List Asset Vulnerabilities

Return information about vulnerabilities associated with entities from Cisco Vulnerability Management.

Parameters

Parameter name Type Default value Is mandatory Description
External ID CSV No Comma-separated list of external IDs associated with an asset. Assets searched by external ID will be searched in parallel to entities.
Lowest Risk Score To Return Int No Risk score that is associated with vulnerabilities. If provided, action will filter out all of the vulnerabilities that have lower risk score than provided in Lowest Risk Score To Return.

Run on

This action runs on the following entities:

  • IP Address
  • Hostname

Action results

Script result
Script result name Value options Example
is_success True/False is_success:False
JSON Result
{
   "Entity": "Entity",
   "EntityResult": [
       {
           "id": 1177,
           "status": "open",
           "closed_at": null,
           "created_at": "2025-02-06T09:00:16Z",
           "due_date": "2024-09-03",
           "notes": "Unknown",
           "port": [],
           "priority": 10,
           "identifiers": [
               "CVE-2024-38107"
           ],
           "last_seen_time": "2025-02-06T08:59:24.000Z",
           "scanner_score": null,
           "fix_id": 2692956,
           "scanner_vulnerabilities": [
               {
                   "port": null,
                   "external_unique_id": "CVE-2024-38107",
                   "open": true
               }
           ],
           "asset_id": 101,
           "connectors": [
               {
                   "id": 160084,
                   "name": "Custom CSV",
                   "connector_definition_name": "Custom CSV",
                   "vendor": "Cisco"
               }
           ],
           "service_ticket": null,
           "urls": {
               "asset": "api.trial1.eu.kennasecurity.com/assets/101"
           },
           "solution": "The following products are affected by this vulnerability:<ul><li><i>Operating System</i> <b>microsoft windows_10_1507</b></li><li><i>Operating System</i> <b>microsoft windows_10_1607</b></li><li><i>Operating System</i> <b>microsoft windows_10_1809</b></li><li><i>Operating System</i> <b>microsoft windows_10_21h2</b></li><li><i>Operating System</i> <b>microsoft windows_10_22h2</b></li><li><i>Operating System</i> <b>microsoft windows_11_21h2</b></li><li><i>Operating System</i> <b>microsoft windows_11_22h2</b></li><li><i>Operating System</i> <b>microsoft windows_11_23h2</b></li><li><i>Operating System</i> <b>microsoft windows_11_24h2</b></li><li><i>Operating System</i> <b>microsoft windows_server_2012</b></li><li>",
           "patch": true,
           "patch_published_at": "2024-08-13T18:15:10.000Z",
           "cve_id": "CVE-2024-38107",
           "cve_description": "Windows Power Dependency Coordinator Elevation of Privilege Vulnerability",
           "cve_published_at": "2024-08-13T18:15:10.000Z",
           "description": null,
           "wasc_id": null,
           "severity": 7,
           "threat": 3,
           "popular_target": false,
           "active_internet_breach": false,
           "easily_exploitable": false,
           "malware_exploitable": false,
           "remote_code_execution": false,
           "predicted_exploitable": false,
           "platform_types": [
               "operating system"
           ],
           "cvss_v2": {
               "exploit_subscore": 3.1,
               "impact_subscore": 10.0,
               "score": 6.8,
               "temporal_score": 5.6
           },
           "cvss_v3": {
               "exploit_subscore": 1.8,
               "impact_subscore": 5.9,
               "score": 7.8
           },
           "custom_fields": [],
           "first_found_on": "2024-08-13T00:00:00Z",
           "top_priority": false,
           "risk_meter_score": 28,
           "closed": false
       }
   ]
}
Case wall
Result type Description Type
Output message* The action should not fail nor stop a playbook execution:

If data is available for one entity (is_success = true):
print "Successfully listed vulnerabilities for the following entities in Cisco Vulnerability Management: {entity.identifier}".

If 1 entity not found (is_success=true):
print "The action wasn't able to find the following entities in Cisco Vulnerability Management: {entity.identifier}"

If data is not available for all (is_success=false):
None of the provided entities were found.

If no vulnerabilities for some (is_success=true):

No vulnerabilities based on the provided criteria were found for the following entities in Cisco Vulnerability Management: {entity.identifier}

If no vulnerabilities for all (is_success=true):

No vulnerabilities based on the provided criteria were found for the provided entities.

The action should fail and stop a playbook execution:

If fatal error, like wrong credentials, no connection to server, other:
print "Error executing action "List Asset Vulnerabilities". Reason: {0}''.format(error.Stacktrace)
General

Request Data Export

Request data export from Cisco Vulnerability Management and attach results to the case wall. This action doesn't run on Google SecOps entities.

This action is asynchronous. Adjust the script timeout value in the Google SecOps IDE for the action as needed.

Parameters

Parameter name Type Default value Is mandatory Description
Export Format DDL JSON

Possible values:
  • JSON
  • JSONL
  • XML
Yes Format of the data export.
Export Model DDL Asset

Possible values:
  • Asset
  • Vulnerability
  • Fix
  • Finding
Yes Model of object that needs to be exported.
Export Fields CSV No Comma-separated list of fields that you want to return.
Query Filter String No Query to filter data that should be exported.

Run on

N/A

Action results

Script result
Script result name Value options Example
is_success True/False is_success:False
Case wall
Result type Description Type
Output message* The action should not fail nor stop a playbook execution:

If data is available(is_success = true):
print "Successfully performed data export in Cisco Vulnerability Management.".

Async message:
Waiting for data export to complete…


The action should fail and stop a playbook execution:

If fatal error, like wrong credentials, no connection to server, other:
print "Error executing action "Request Data Export". Reason: {0}''.format(error.Stacktrace)

If error_message in response:

print "Error executing action "Request Data Export". Reason: {error_message}''.
General

Need more help? Get answers from Community members and Google SecOps professionals.