IBM Guardium Appliance¶

About¶
IBM Security Guardium Data Protection supports a zero trust approach to security. It discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and user behavior analytics to help discover unusual activity around sensitive data.
Product Details¶
Vendor URL: IBM Guardium
Product Type: DLP
Product Tier: Tier II
Integration Method: Custom
Log Guide: IBM Guardium - Cyderes Documentation
Parser Details¶
Log Format: JSON CEF
Expected Normalization Rate: 95-100%
Data Label: GUARDIUM
UDM Fields (list of all UDM fields leveraged in the Parser):
| Log File Field | UDM Field |
|---|---|
| ALLOW,BLOCK | security_result.action |
| AUTHTYPE_UNSPECIFIED | extensions.auth.type |
| DATABASE | target.resource.resource_type |
| GENERIC_EVENT | metadata.event_type |
| INBOUND,OUTBOUND | network.direction |
| MACHINE | extensions.auth.type |
| SERVICE_ACCOUNT_TYPE | principal.user.account_type |
| SETTING | target.resource.resource_type |
| SSH | network.application_protocol |
| TCP,UDP | network.ip_protocol |
| USER_LOGIN | metadata.event_type |
| action | security_result.action_details |
| act | additional.fields |
| app_protocol_output | network.application_protocol |
| appcategory | security_result.summary |
| application_user_name | principal.user.user_display_name |
| category | security_result.category_detail |
| cat | security_result.category_details |
| cfp1 | additional.fields |
| cfp2 | additional.fields |
| cfp3 | additional.fields |
| cfp4 | additional.fields |
| checked_permissions | security_result.rule_name |
| client_hostname | principal.hostname |
| client_ip | principal.ip |
| client_port | principal.port |
| cn1 | additional.fields |
| cn2 | additional.fields |
| cn3 | additional.fields |
| componentId | principal.resource.name |
| cs1 | additional.fields |
| cs1 | security_result.severity |
| cs2 | additional.fields |
| cs3 | additional.fields |
| cs4 | additional.fields |
| cs5 | additional.fields |
| cs6 | additional.fields |
| cs7 | additional.fields |
| database_name | target.resource.name |
| db_name | target.resource.name |
| db_protocol_version | additional.fields |
| db_protocol | additional.fields |
| db_username | principal.user.userid |
| db_username | target.user.userid |
| db_user | target.user.user_display_name |
| description | metadata.description |
| destinationServiceName | target.application |
| destinationTranslatedAddress | target.nat_ip |
| destinationTranslatedPort | target.nat_port |
| devicePayloadId | additional.fields |
| device_product | metadata.product_name |
| device_vendor | metadata.vendor_name |
| device_version | metadata.product_version |
| dhost | target.hostname |
| dmac | target.mac |
| dntdom | target.administrative_domain |
| dpid | target.process.pid |
| dport | target.port |
| dproc | target.process.command_line |
| dpt | target.port |
| dst_ip | target.ip |
| dsthost | target.hostname |
| dst | target.hostname |
| dst | target.ip |
| duid | target.user.userid |
| duser | target.user.user_display_name |
| duser | target.user.userid |
| eventId | additional.fields |
| event_type | metadata.product_event_type |
| event | metadata.product_event_type |
| event | src.hostname |
| externalId | additional.fields |
| fname | additional.fields |
| full_sql_id | target.process.pid |
| full_sql | target.process.command_line |
| host_key | additional.fields |
| in | network.received_bytes |
| ip_protocol_out | network.ip_protocol |
| message | security_result.summary |
| msg | metadata.description |
| mwProfile | security_result.rule_name |
| name | principal.resource.name |
| observer | observer.hostname |
| observer | observer.ip |
| observer | principal.hostname |
| oldFilePath | src.file.full_path |
| oldFileSize | src.file.size |
| old_permissions | src.resource.attribute.permissions |
| os_user | principal.user.user_display_name |
| os_user | principal.user.userid |
| os_user | src.user.userid |
| outcome | security_result.description |
| out | network.received_bytes |
| pid | principal.process.pid |
| principal_host | principal.hostname |
| principal_ip | principal.ip |
| principal_role | principal.user.attribute.roles |
| process | metadata.product_event_type |
| product_event | metadata.product_event_type |
| product | metadata.product_name |
| requestClientApplication | network.http.user_agent |
| requestMethod | network.http.method |
| request_type | security_result.rule_name |
| request | target.url |
| resource | principal.resource.id |
| roleName | principal.user.role_name |
| roles | target.user.attribute.roles |
| rule_description | security_result.rule_name |
| rule_number | security_result.rule_id |
| sender_ip | intermediary.ip |
| server_hostname | target.hostname |
| server_ip | target.ip |
| server_port | target.port |
| server_type | additional.fields |
| server_type | target.resource.resource_subtype |
| service_name | target.application |
| session_end | target.resource.attribute.last_update_time |
| session_id | network.session_id |
| session_start | target.resource.attribute.creation_time |
| severity | security_result.severity |
| shost | principal.hostname |
| smac | principal.mac |
| smb_host | additional.fields |
| smb_stage1 | additional.fields |
| smb_uid | additional.fields |
| sntdom | principal.administrative_domain |
| sourceServiceName | principal.application |
| sourceTranslatedAddress | principal.nat_ip |
| sourceTranslatedPort | principal.nat_port |
| source_program | principal.application |
| source | src.hostname |
| spid | principal.process.pid |
| sproc | principal.process.file.full_path |
| spt | principal.port |
| sql | principal.process.command_line |
| src | principal.hostname |
| src | principal.ip |
| start | additional.fields |
| subject | security_result.summary |
| summary | security_result.summary |
| suser | principal.user.userid |
| target_role | target.user.attribute.roles |
| target_user | target.user.userid |
| type | metadata.product_event_type |
| users | principal.user.user_display_name |
| user | principal.user.userid |
| uuid | principal.resource.product_object_id |
| vendor | metadata.vendor_name |
| version | metadata.product_version |
Product Event Types¶
| Event Type |
|---|
| GENERIC_EVENT |
| NETWORK_CONNECTION |
| NETWORK_UNCATEGORIZED |
| PROCESS_LAUNCH |
| RESOURCE_CREATION |
| RESOURCE_DELETION |
| RESOURCE_READ |
| RESOURCE_WRITTEN |
| SETTING_MODIFICATION |
| STATUS_UPDATE |
| USER_CHANGE_PASSWORD |
| USER_CHANGE_PERMISSIONS |
| USER_LOGIN |
| USER_RESOURCE_ACCESS |
Log Sample¶
<25>Oct 21 14:05:13 hostname2 GuardiumSniffer[12163]: subject "SQLGUARD ALERT", "CEF:0|IBM|Guardium|11.0|20050|Failed Login - Log Violation|5|rt=1634839512966 cs1=LOW cs1Label=Severity cs2=ORACLE cs2Label=Server Type cs3=Login cs3Label=Classification cat=Data Privacy app=TNS cs4=3.15 cs4Label=DB Protocol Version suser= sproc=JDBC THIN CLIENT act=LOGIN_FAILED start=1634839512966 externalId=619155 duser=john.doe dst=10.10.10.109 dpt=61290 src=10.10.10.108 spt=29984 proto=TCP cs1= dstHost=hostname1"
<30>Sep 2 08:35:05 hostname3 guard_sender[3194]: LEEF:1.0|IBM|Guardium|9.0|Privileged Users - Log Full Details|ruleID=11111|ruleDesc=Privileged Users - Log Full Details|severity=INFO|devTime=2022-09-02 08:34:22.976000|serverType=ORACLE|classification=Priv. Users|category=Security|dbProtocolVersion=3.14|usrName=|sourceProgram=C:\HOSTNAME\BIN\PROWIN32.EXE|start=1662125662976|dbUser=SYSTEM|dst=10.10.10.10|dstPort=1522|src=10.10.10.11|srcPort=53278|protocol=TCP|type=SQL_LANG|violationID=676559009840268008|sql='redacted'|error=
Sample Parsing¶
metadata.event_timestamp = "2021-10-21T14:05:13Z"
metadata.event_type = "USER_LOGIN"
metadata.vendor_name = "IBM"
metadata.product_name = "Guardium"
metadata.product_version = "11.0"
metadata.product_event_type = "SQLGUARD ALERT"
metadata.description = "Failed Login - Log Violation"
metadata.ingested_timestamp = "2021-10-21T18:05:21.739622Z"
additional.act = "LOGIN_FAILED"
additional.start = "1634839512966"
additional.DB Protocol Version = "3.15"
additional.Server Type = "ORACLE"
additional.external_id = "619155"
principal.process.file.full_path = "JDBC THIN CLIENT"
principal.ip = "10.10.10.108"
principal.port = 29984
principal.application = "TNS"
principal.namespace = domain.com
principal.asset.ip = "10.10.10.108"
target.hostname = "hostname1"
target.user.userid = "John.Doe"
target.ip = "10.10.10.109"
target.port = 61290
target.namespace = "domain1"
target.asset.ip = "10.10.10.109"
observer.hostname = "hostname2"
observer.namespace = "domain2"
security_result.category_details = "Data Privacy"
security_result.action = "BLOCK"
security_result.severity = "LOW"
network.ip_protocol = "TCP"
Parser Alerting¶
This product currently does not have any Parser-based Alerting