ETM Integration With CSAM
Qualys CyberSecurity Asset Management is a comprehensive solution that enables organizations to discover, inventory, and monitor all assets across their IT environment, providing visibility into security gaps and compliance issues. CSAM is the solution that combines native scanning, agent scanning, and passive discovery and complements with API-based third-party connectors to provide the most comprehensive asset attack surface coverage.
Prerequisite
CSAM must be enabled for your subscription for implementing the CSAM integration with ETM,
How Does the Integration Work?
The integration process follows these steps:
- Contact your TAM or support to enable your subscription for CSAM
- Run baseline for CSAM to ingest existing CSAM data in ETM.
The ETM automatically ingests findings from CSAM into as misconfigurations.
Failed postures from your CSAM environment is displayed in ETM with their respective risk scores, allowing for precise identification of security issues that require remediation.
The integration ensures data synchronization between systems for current security posture information in ETM for effective risk management.
View Assets and Findings in ETM
After completing the integration, you can view and manage CSAM findings within the ETM interface.
- Navigate to Risk Management > Findings > Misconfigurations to access the consolidated view of security posture findings.
- To filter specifically for CSAM findings, use the QQL query syntax:
finding.vendorProductName:'CSAM'.
-
To view details about misconfiguration, click View Details from Quick Action menu of the selected configuration.
You can view various details in different tabs.
Summary
The Summary page has different details, such as Basic Details, Description, and asset Information, such as Identification and Activity. The Basic Details include details such as the Finding ID and the Type Detected. Information about Sources is available, along with the last-detected and first-detected dates, instances, and technology used.
QDS Details
The Qualys Detection Score (QDS) Details includes Contributing Factors for Qualys Detection Score and Additional Insights such as Highest Contributing QVS, Highest Contributing CVE, Lifecycle Information and so on.
Additional Details
The Additional Details page lists Control/Rule Details like Reference ID, Misconfiguration Type, sub type, Severity, Control URL and so on. Policy Details section displays Policy Name, Policy URL, Decription, Evaluated On, Created By and so on.
Sources
The Sources page displays details such as Aggregated Records and Source Records, including Connector Name, Connector ID, Source Policy URL, Source Asset ID, Policy Name, Technology, and Technology Category.