Skip to content

title: Aqua Security

Product Name

About

Unify cloud security to detect, prioritize, and reduce risk.

Product Details

Vendor URL: Aqua Security

Product Type: Cloud Security

Product Tier: Tier II

Integration Method: webhook

Integration URL: Generic Webhook - Cyderes Documentation

Parser Details

Log Format: JSON

Expected Normalization Rate: 100%

Data Label: AQUA_SECURITY

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
result additional.fields
podnamespace additional.fields
namespace additional.fields
k8s_cluster additional.fields
Static value metadata.vendor_name
Static value metadata.product_name
action metadata.description
type metadata.product_event_type
user principal.user.userid
account_id principal.user.product_object_id
description security_result.description
control security_result.description
adjective security_result.summary
reason security_result.summary
category security_result.category_details
repository target.resource.name
resource_name target.resource.name
registry target.resource.product_object_id
resource_type target.resource.type
imagehash target.file.sha256
action security_result.action
policy_name security_result.rule_name
rule security_result.rule_name
policy_id security_result.rule_id

Product Event Types

Event UDM Event Classification
action = update RESOURCE_WRITTEN
action = Create New Respository RESOURCE_CREATION
all others GENERIC_EVENT

Log Sample

{
  "type": "Orchestrator",
  "category": "kubernetes.enforcer",
  "control": "SELinux custom options set",
  "podnamespace": "pod_namespace",
  "reason": "There are failed controls in kubernetes assurance policy Default",
  "result": 3,
  "resource_name": "pod_name-test-mgmt-aaaaaa-postgres-bbbb-dfc75d5fc-xnr8",
  "audit_type": "kap",
  "hostgroup": "default kube enforcer group",
  "resource": "pod",
  "resource_type": "pod",
  "namespace": "pod_namespace",
  "rule": "Default",
  "user": "system:serviceaccount:pod_namespace:aaa-bb",
  "action": "update",
  "compliance": "non-compliant",
  "create_time": 1695303851,
  "eval_msg": "pod pod_name-test-mgmt-aaaaaa-postgres-bbbb-dfc75d5fc-xnr8 in pod_namespace namespace should not set spec.securityContext.seLinuxOptions, spec.containers[*].securityContext.seLinuxOptions or spec.initContainers[*].securityContext.seLinuxOptions.",
  "k8s_cluster": "aaa-bb-non-prod"
}

## Sample Parsing

```text
additional.fields["namespace"] = "pod_namespace"
additional.fields["podnamespace"] = "pod_namespace"
additional.fields["k8s_cluster"] = "aaa-bb-non-prod"
additional.fields["result"] = "3"
metadata.description = "update"
metadata.event_timestamp.seconds = 1695303869
metadata.event_timestamp.nanos = 978711000
metadata.event_type = "RESOURCE_WRITTEN"
metadata.product_event_type = "Orchestrator"
metadata.product_name = "Security"
metadata.vendor_name = "Aqua"
principal.user.userid = "system:serviceaccount:pod_namespace:aaa-bb"
security_result.category_details = "kubernetes.enforcer"
security_result.description = "SELinux custom options set"
security_result.rule_name = "Default"
security_result.summary = "There are failed controls in kubernetes assurance policy Default"
target.resource.name = "pod_name-test-mgmt-aaaaaa-postgres-bbbb-dfc75d5fc-xnr8r"
target.resource.type = "pod"

Rules

Coming Soon