Cycode¶
About¶
Cycode is a complete software supply chain security solution that provides visibility, security and integrity across all phases of the SDLC.
Product Details¶
Vendor URL: Cycode
Product Type: Application
Product Tier: Tier III
Integration Method: Webhook
Integration URL: Webhook Integration
Log Guide: n/a
Parser Details¶
Log Format: JSON
Expected Normalization Rate: near 100%
Data Label: CYCODE
UDM Fields (list of all UDM fields leveraged in the Parser):
Log File Field | UDM Field |
---|---|
"Cycode" | metadata.vendor_name |
"Cycode" | metadata.product_name |
correlation_message | metadata.description |
source_policy_name | metadata.product_event_type |
id | metadata.product_log_id |
link | metadata.url_back_to_product |
detection_details.external_scanner_id | observer.process.pid |
detection_details.repository_name | principal.hostname |
scan_id | principal.process.pid |
provider | principal.resource.name |
detection_details.concrete_provider | principal.resource.resource_subtype |
detection_details.file_path | target.file.full_path |
detection_details.file_name | target.file.names |
detection_details.job_url | target.url |
detection_details.organization_name | target.user.company_name |
detection_details.organization_id | target.user.group_identifiers |
detection_details.provider | security_result.about.application |
source_entity_type | security_result.about.asset.category |
source_entity_id | security_result.about.asset.asset_id |
detection_details.repository_id | security_result.about.asset_id |
detection_unique_id | security_result.about.process.pid |
source_entity_name | security_result.about.resource.name |
source_policy_type | security_result.category_details |
correlation_message | security_result.description |
priority | security_result.priority_details |
detection_rule_id | security_result.rule_id |
source_policy_name | security_result.rule_name |
detection_details.owasp | security_result.rule_set |
type | security_result.rule_type |
severity | security_result.severity |
severity | security_result.severity_details |
summary | security_result.summary |
detection_details.cwe | security_result.threat_feed_name |
detection_type_id | security_result.threat_id |
Product Event Types¶
Product Event | Description | UDM Event |
---|---|---|
File event | SCAN_FILE | |
All other | GENERIC_EVENT |
Log Sample¶
{"id":"eventID","source_policy_id":"src_policyID","detection_type_id":"src_policyID","detection_unique_id":"uniqueID","source_entity_id":"repoID","source_policy_name":"Improper Certificate Validation","source_policy_type":"SAST","source_entity_name":"src_entityname","source_entity_type":"Repository","correlation_message":"Certificate verification has been explicitly disabled. This permits insecure connections to insecure servers. Re-enable certification validation.","detection_details":{"organization_id":"orgID","external_scanner_id":"externalID","organization_name":"org_name","policy_id":"src_policyID","detection_rule_id":"ruleID","file_path":"file_path.py","file_name":"file_name.py","file_extension":".py","start_position":5,"end_position":5,"line":26,"storage_details":{"path":"path.json","folder":"external-scanner-violations","size":610},"cwe":["CWE-295: Improper Certificate Validation"],"owasp":["A3: Sensitive Data Exposure"],"category":"Security","languages":["python"],"repository_name":"src_entityname","repository_id":"repoID","line_in_file":26,"branch_name":"master","branch_id":"branchID","branch_url":"branchUrl","file_url":"fileUrl"},"severity":"Critical","provider":"Github","type":"SAST","is_hidden":false,"link":"https://app.cycode.com/detection/eventID","scan_id":"0scanID","detection_rule_id":"ruleID","labels":null,"tags":null,"sdlc_stages":["Code"],"policy_labels":null,"priority":0,"project_ids":[],"text":"Certificate verification has been explicitly disabled. This permits insecure connections to insecure servers. Re-enable certification validation.. Link: https://app.cycode.com/detection/eventID","summary":"Cycode detection: Improper Certificate Validation","description":"Certificate verification has been explicitly disabled. This permits insecure connections to insecure servers. Re-enable certification validation.\n\n-------Alert Info-------\nLink: https://app.cycode.com/detection/eventID\nSeverity: Critical\nSource: Github\nType: SAST\nOrganization Name: org_name\nFile Path: file_path.py\nFile Name: file_name.py\nFile Extension: .py\nStart Position: 5\nEnd Position: 5\nLine: 26\nCategory: Security\nRepository Name: src_entityname\nLine In File: 26\nBranch Name: master\nBranch Url: branchUrl\nFile Url: fileUrl"}
Sample Parsing¶
metadata.product_log_id = "eventID"
metadata.description = "Certificate verification has been explicitly disabled. This permits insecure connections to insecure servers. Re-enable certification validation."
metadata.event_timestamp = "2021-12-20T23:54:46.6929430Z"
metadata.event_type = "SCAN_FILE"
metadata.vendor_name = "Cycode"
metadata.product_name = "Cycode"
metadata.product_event_type = "Improper Certificate Validation"
metadata.url_back_to_product = "https://app.cycode.com/detection/eventID"
metadata.ingested_timestamp = "2021-12-20T23:54:46.6929430Z"
principal.hostname = "src_entityname"
principal.process.pid = "scanID"
principal.resource.name = "Github"
target.user.group_identifiers = "orgID"
target.user.company_name = "org_name"
target.url = "fileURL"
target.file.full_path = "file_path.py"
target.file.names = "file_name.py"
observer.process.pid = "externalID"
security_result.about.asset_id = "Repo ID: repoID"
security_result.about.process.pid = "uniqueID"
security_result.asset.asset_id = "Entity ID: repoID"
security_result.asset.category = "Repository"
security_result.resource.name = "src_entityname"
security_result.category_details = "SAST"
security_result.description = "Certificate verification has been explicitly disabled. This permits insecure connections to insecure servers. Re-enable certification validation."
security_result.rule_set = "A3: Sensitive Data Exposure"
security_result.rule_id = "ruleID"
security_result.rule_name = "Improper Certificate Validation"
security_result.rule_type = "SAST"
security_result.severity = "CRITICAL"
security_result.severity_details = "Critical"
security_result.summary = "Cycode detection: Improper Certificate Validation"
security_result.priority_details = "0"
security_result.threat_id = "src_policyID"
security_result.threat_feed_name = "CWE-295: Improper Certificate Validation"
Parser Alerting¶
This product currently does not have any Parser-based Alerting
Rules¶
Coming Soon