RSA Archer Integration Guide
RSA Archer Integration Guide
Trademarks
For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm#rsa.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are
furnished under license, and may be used and copied only in accordance with the terms of such
license and with the inclusion of the copyright notice below. This software and the
documentation, and any copies thereof, may not be provided or otherwise made available to any
other person.
No title to or ownership of the software or documentation or any intellectual property rights
thereto is hereby transferred. Any unauthorized use or reproduction of this software and the
documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment
by EMC.
Third-Party Licenses
This product may include software developed by parties other than RSA. The text of the license
agreements applicable to third-party software in this product may be viewed on the product
documentation page on RSA Link. By using this product, a user of this product agrees to be fully
bound by terms of the license agreements.
Distribution
EMC believes the information in this publication is accurate as of its publication date. The
information is subject to change without notice.
April 2019
RSA Archer Integration Guide
Contents
3
RSA Archer Integration Guide
4
RSA Archer Integration Guide
l Incident Remediation: Incidents are handled in Security Analytics, but the remediation tasks
are optionally exported to Archer.
Topics
l Configure Security Analytics to Work With Archer
l Incident Remediation: Incidents are handled in Security Analytics, but the remediation tasks
are optionally exported to Archer.
The RSA Archer Security Operations Management solution enables you to aggregate all
actionable security alerts, allowing you to become more effective, proactive, and targeted in
your incident response and SOC management. For more information on RSA Archer Sec Ops
capabilities, see RSA Archer documentation on the RSA Archer Community or on the RSA
Archer Exchange Community.
See the SecOps Installation Guide for Archer platforms supported.
The version of RSA Archer determines how RSA Security Analytics will be integrated.
l RSA Archer Security Operations Management 1.2 integrates with RSA Security Analytics
using RSA UCF (Unified Collector Framework) which comprises SAIM integration service
and RCF (RSA Connector Framework).
l RSA Archer Security Operations Management 1.3 integrates with RSA Security Analytics
using the RSA UCF (Unified Collector Framework) which comprises SAIM Integration
service and SecOps Watchdog service.
Integration Methods
You have to configure system integration settings to manage incident workflow in RSA Archer
Security Operations Management. When this setting is enabled, Incidents and Remediation
Tasks are no longer visible in RSA Security Analytics.
For information on how to configure system integration settings to manage incident workflow in
RSA Archer Security Operations, see the Configure Integration Setting to Manage Incidents
in RSA Archer Security Operations topic in the Incident Management Guide (Incident
Management > System Integration > .Configure Integration Setting to Manage Incidents in RSA
Archer Security Operations).
l Manage the incident workflow in the Security Analytics Incident Management module and
allow analysts the option to escalate remediation tasks and open data breaches for
management and remediation in the RSA Archer Security Operations Management solution.
If you select this option, the Security Analytics Incident Management Integration Service
transports remediation tasks (created as Findings), data breaches, or both.
Note: You must configure the same option in both RSA Security Analytics and the Security
Analytics Incident Management Integration Service.
l Manage the incident workflow in the Security Analytics Incident Management module and
allow analysts the option to escalate remediation tasks and open data breaches for
management and remediation in the RSA Archer Security Operations Management solution.
If you select this option, the Unified Collector Framework transports remediation tasks
(created as Findings), data breaches, or both.
Note:
• You must configure the same option in both RSA Security Analytics and the Unified
Collector Framework.
• Integration of the RSA Security Analytics Incident module with Reporting Engine or ESA
can result in duplicate events and incidents created in RSA Archer SecOps.
UCF supports multiple SIEM tools connections at the same time, such as supporting Security
Analytics Reporting Engine, HP ArcSight, and Security Analytics Incident Management.
However, different instances of the same SIEM tool are not supported, such as two Security
Analytics servers connected to the same UCF.
Prerequisites
l Install RSA Archer Security Operations Management. See RSA Archer documentation on the
RSA Archer Community or on the Content Tab
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer_exchange.
l Security Analytics 10.5 or later is compatible with SecOps 1.2 and SecOps 1.3. Security
Analytics 10.5 is also compatible with SecOps 1.1, however, this is not recommended.
l It is recommended that you upgrade to SecOps 1.3 if using Security Analytics 10.6.
l Ensure that the Incident Management module is configured in RSA Security Analytics.
l For Archer SecOps 1.3, you must create a user account for the web service client to use to
transfer data into the RSA Archer GRC Platform.
2. In the First and Last Name fields, enter a name that indicates that the UCF uses this account
to push data into RSA Archer GRC. For example, UCF User, Push.
Note: When configuring the Pull account, enter a name that indicates that the UCF uses
this account to pull data from RSA Archer GRC. For example, UCF User, Pull.
Note: If you do not specify a user name, the RSA Archer GRC Platform creates the user
name from the first and last name entered when you save the new user account.
4. In the Contact Information section, in the Email field, enter an email address to associate
with this new user account
5. In the Localization section, change the time zone to (UTC) Coordinated Universal Time.
Note: The UCF uses UTC time to baseline all the time-related calculations.
6. In the Account Maintenance section, enter and confirm a new password for the new user
account.
Note: Note the user name and password for the new user account that you just created.
You need to enter these credentials when you set up the UCF to communicate with the
RSA Archer GRC Platform through the web service client.
8. In the Security Parameter field, select the security parameter that you want to use for this
user.
Note: If you assign a default security parameter with a password change interval of 90
days, you also must update the user account password stored in the SA IM Integration
Service every 90 days. To avoid this, you can optionally create a new security parameter
for the SA IM Integration Service user account and set the password change interval to the
maximum value allowed by your corporate standards.
c. Scroll down and select SOC: Solution Administrator and EM: Read Only.
d. Click OK.
11. If the machine language and regional settings of your RSA Archer GRC system are set to
anything other than English-US, do the following:
a. Open the user account you just created, and in the Localization section, in the Locale
field, select English (United States), and click Save.
b. On the Windows system hosting your RSA Archer GRC Platform, open Internet
Information Services (IIS) Manager.
c. Expand your RSA Archer GRC site, click .Net Globalization, in both the Culture and UI
Culture fields, select English (United States), and click Apply.
12. Repeat steps 1 – 11 to create a second user account for the UCF to pull data from RSA
Archer GRC.
Note: Some endpoints are necessary to use different integrations. The following list shows the
mandatory endpoints.
l Syslog Server
l Enterprise Management
Note:
• If Non-SecOps mode is selected, incidents are managed in SA IM instead of RSA Archer
Security Operations Management.
• You must configure the TCP, secure TCP, and UDP ports.
• Ensure the certificate subject name for your RSA Archer GRC server matches the
hostname.
Procedure
1. On your UCF system, open the Connection Manager, as follows:
c. Type:
runConnectionManager.bat
3. Add an endpoint for pushing data to RSA Archer Security Operations Management, as
follows:
e. Enter the user name of the user account you created to push data into your RSA Archer
GRC system.
f. Enter the password for the user account you created to push data into your RSA Archer
GRC system, and confirm the password.
g. When asked whether this account is used for pulling data, enter False.
4. Add an endpoint for pulling data from RSA Archer Security Operations Management, as
follows:
e. Enter the user name of the user account you created to pull data from your RSA Archer
GRC system.
f. Enter the password for the user account you created to pull data from your RSA Archer
system, and confirm the password.
g. When asked whether this account is used for pulling data, enter True.
e. Enter the target queue for remediation tasks. Selecting All processes both the RSA
Archer Integration (GRC) and IT Helpdesk (Operations).
f. To automatically add certificates to the Security Analytics trust store, do the following:
i. Enter Yes.
Note: If you receive an error that the CA trust store failed to set, see Troubleshoot RSA
Archer Integration.
l Field Description
l SSL configured
l TCP port
l Secure TCP port if the Syslog client sends the Syslog message in secure TCP mode.
Note: Defaults to 1515. If you do not want to host the Syslog server in this mode, enter 0.
TCP port: Enter the TCP port if the Syslog client sends the Syslog message in TCP mode.
Note: Defaults to 1514. If you do not want to host the Syslog server in this mode, enter 0.
UDP port: Enter the UDP port if the Syslog client sends the Syslog message in UDP mode.
Note: Defaults to 514. If you do not want to host the Syslog server in this mode, enter 0.
By default, the Syslog server will run in the above three modes, unless it is disabled by
entering 0.
8. To test the Syslog client, enter the number for Test Syslog Client. Use the Test Syslog client
with the files from <install_dir>\SA IM integration service\config\mapping\test-files\.
Configure Syslog Output Action for the Reporting Engine for Security
Analytics 10.5
Note: This procedure is for SecOps 1.3 with Security Analytics 10.5.
2. Select your Reporting Engine Service, and click System > Config.
4. In the SA Configuration section, in the Host Name field, enter the host name or IP address of
your Reporting Engine server.
Note: If you do not enter a value in this field, the link in the RSA Archer Security Alerts
application back to Security Analytics will not work.
b. In the Server Port field, enter the port that you selected in the UCF Syslog configuration.
6. Click Save.
Field Description
Server Specify the hostname or IP Address of the system on which you installed the
Name UCF.
Server Port Specify the port number on which you want the UCF to listen for Syslog alert
messages.
7. Click Save.
Step 4: Forward ECAT Alerts to the Security Analytics Incident Management Service
2. In the Service panel, select the Incident Management service, and > View >
Explore.
The Services Explore view is displayed.
l Username – The username for the user account for the IM database (ESA creates an
im user with the right privileges)
Note: Restarting the Incident Management Service is important for the database configuration
to be complete.
l Allow analysts to escalate remediation tasks for the Operations target queue as
tickets.
l Allow analysts to escalate remediation tasks for the GRC target queue as Findings.
l Allow analysts to report data breaches and trigger the breach response process in the
RSA Archer Security Operations Management solution.
For more information, see Configure Integration Setting to Manage Incidents in
Security Analytics in the Incident Management guide.
4. Click Apply.
Note: This step also applies to Integration with Archer SecOps 1.2.
a. In the Security Analytics menu, select Administration > Services > ESA service.
d. Ensure that the Forward Alerts on Message Bus checkbox is selected by default. If
needed, select the Forward Alerts on Message Bus checkbox and click Apply.
a. In Security Analytics, click Administration > Services > Reporting Engine service.
b. Click > View > Config for the Reporting Engine service.
d. In the System Configuration section, select the Forward Alerts to IM checkbox and
click Apply.
a. In Security Analytics, click Administration > Services > Malware Analysis service
d. In the Incident Management Alerting section, verify that the Enabled Config Value
checkbox is selected. If the checkbox is not selected, select the checkbox, and click
Apply.
3. In the External Components Configuration window, select the Incident Message Broker.
l Server Hostname/IP. Enter the Host DNS or IP address of the RSA Security Analytics
Server.
6. Click Save.
b. Select Enabled.
c. Click Save.
b. Select Enabled.
l Action
l Match Conditions
l Grouping Options
l Incident Options
l Priority
l Notifications
4. Click Save.
Configure Syslog Output Action for the Reporting Engine for Secur-
ity Analytics
1. In Security Analytics, go to Administration > Services.
2. Select your Reporting Engine Service, and click System > Config.
4. In the SA Configuration section, in the Host Name field, enter the host name or IP address of
your Reporting Engine server.
b. In the Server Port field, enter the port that you selected in the UCF Syslog configuration.
6. Click Save.
Note: Do not copy and paste the above code. Type it in to avoid errors.
l Expand com.rsa.soc.re
5. Select the group you created, and in the Rule toolbar, click Add (+).
6. In the Syslog Name field, enter a name for the SecOps syslog configuration to be used to
configure alerts.
9. Enter values in the Select and Where fields based on the rule that you want to create.
Note: Add the Syslog configuration with the Syslog name set above.
Note: To see the same number of alerts in SA RE and RSA Archer GRC, ensure that you’ve
selected Once for execute in both the Syslog and Record tabs.
6. Click Create.
7. Repeat steps 3 to 6 for each alert template that you want to add.
3. Select Enable.
Note: If you do not enter a value in this field, the link in the RSA Archer Security Alerts
application to RSA Security Analytics will not work.
10. In the Body Template field, select the template that you want to use for this Syslog alert.
l Server
l Name
l Specify the hostname or IP Address of the system on which you installed the UCF.
l Server
l Port
l Specify the port number on which you want the UCF to listen for
7. Click Save.
Note: Do not copy and paste the above code. Type it in to avoid errors.
Procedure:
1. Select Administration > System > Global Notifications.
2. Click the Templates tab.
3. Click Add (+).
4. In the Template Type field, select Event Stream Analysis.
5. In the Name field, enter the name for the template.
6. (Optional) In the Description field, enter a brief description for the template.
7. In the Template field, enter the alert message.
8. Click Save.
9. Repeat steps 3 – 8 for each alert template that you want to add.
3. Click Select.
8. Select a Severity.
b. Enter a name, select a condition type, and add meta data/value pairs for your statement.
c. Click Save.
d. Repeat steps a – c until you have built all your statements for the rule.
11. Select the notification, Syslog server, and template that were created previously.
17. In the ESA Rules section, click + to choose the ESA Rule that you created, and click Deploy
Now.
Note: If you plan to feed Business Unit and Facility information from your RSA Archer GRC
Platform into Live, you must also add keys for these fields to the index-concentrator-
custom.xml file.
Task
Update the RSA Security Analytics Host File for SSL Mode
l If content already exists in the file, add a key for the new meta data element as follows:
<key description="Criticality" format="Text"
level="IndexValues"
name="criticality" defaultAction="Open"/>
5. Click Apply.
c. Click OK.
8. Repeat steps 1-7 for the Log Decoders and Index Decoders, using index-logdecoder-
custom.xml and index-decoder-custom.xml.
Field Description
Web Defaults to 9090. Can be configured to host the web server url. The URL
Server with the port number should be provided as the URL in SA live feed: http
Port (s)://hostname:port/archer/sa/feed
Feed Directory where the assets CSV file from RSA Archer GRC are saved.
Directory
Note: The directory path provided must exist.
3. If you selected Yes for SSL mode, complete the following fields:
l Copy certs to SA box. Enter Yes to have the certificates automatically copied from RSA
Archer Security Operations Management to RSA Security Analytics.
l SA Host Username. Enter the username for logging in to the SA server to copy the
certificates.
l SA Host Password. Enter the password for logging in to the SA server to copy the
certificates.
Note: If copying the certificates fails and adding the endpoint failed, manually copy the
certificates. See Manually Copy Enterprise Management Certificates in Troubleshoot RSA
Archer Integration. After copying the certificates, you must add the Enterprise Management
plug-in without automatically copying the certificates.
Update the RSA Security Analytics Host File for SSL Mode
1. Edit the host file on the SA server at the following location: vi /etc/hosts
4. While configuring the SA live feed, enter the hostname for the URL instead of the IP
address and the port number configured for Enterprise Management endpoint in the UCF:
https: //<ucf-host-name> : <EM_Port>/archer/sa/feed.
Note: For RSA Archer SecOps 1.2: In order for RSA Security Analytics to download feed
files from your RCF machine and push the feeds to Decoders, you must create a recurring
feed task and define the feed settings. The procedure is similar to RSA Archer SecOps 1.3,
with a few exceptions.
2. Click .
4. Select Recurring.
l https://ucf_hostname_or_ip:port/archer/sa/feed
where http(s):ucf_hostname_or_ip:port is the address of your Security Analytics
Incident Management Integration Service system. Use https if you have enabled
SSL communication with RSA Security Analytics. For example: http://10.10.10.10:9090 or
https://10.10.10.10:8443.
Note: If Incident Management is running in SSL mode, the hostname must be used in the
URL.
7. Select Authenticated.
8. In the User Name and Password fields, enter the credentials of the user account you created
for RSA Security Analytics to use to access files on the Security Analytics Incident
Management Integration Service system.
10. In the Date Range section, define a start and end date for the feed, and click Next.
11. Select each Decoder to which you want to push this feed, and click Next.
14. In the second column, set the Key value to criticality, and click Next.
3. Click Start.
Note: If you do not stop the Watchdog service, the Watchdog service starts the
Security Analytics Incident Management Service before intended.
4. Click Stop.
Note: If the service takes too long to shutdown, use the Task Manager to end the
RSASAIMDCService.
3. Click Uninstall.
2. If the credentials are correct, but the error still occurs, Manually Copy Certificates.
Note: If you copied the certificates because adding the Enterprise Management endpoint
failed, you must add the endpoint again without automatically copying the certificates. See
Configure Endpoints in RSA Unified Collector Framework in Configure Security Analytics
to Work With Archer.
2. Make sure the format of the copied file is a windows text file. The following example
displays the file with carriage return and line feed (CRLF) characters.
# file rootcastore.crt.pem
rootcastore.crt.pem: ASCII text, with CRLF line terminators
3. If you find CRLF line terminators in the output, run the following command to remove the
CRLF line terminators.
# vi rootcastore.crt.pem
4. You must run the following command to convert text file from windows text format to unix
format
:%s/\r//g
set ff=unix
13. Run Connection Manager again to continue with the SA endpoints configuration.
1. Confirm that the time on your middleware system and the RSA Archer Platform are
synchronized or with a difference of no more than one second.
l For Findings, you should select to manage the incident workflow in RSA Security
Analytics.
l For Security Incidents, you should select to manage the incident workflow in RSA Archer
Security Operations Management.
4. SSH to the SA web server host and enter the following command to verify that the RSA
Archer incident queue (im.archer_incident_queue) is created:
curl -k -u guest:guest
https://127.0.0.1:15671/api/queues/%2Frsa%2Fi
m%2Fintegration/im.archer_incident_queue --
silent --stderr - | grep -o '"name"\:.*
"name":"im.archer_incident_
queue","vhost":"/rsa/im/integration","durable
":true,"auto_delete":false,"arguments":
{},"node":"sa@localhost"}
5. SSH to the SA web server host and enter the following command to verify that the RSA
Archer tickets queue (im.archer_tickets_queue) is created:
curl -k -u guest:guest
https://127.0.0.1:15671/api/queues/%2Frsa%2Fi
m%2Fintegration/im.archer_tickets_queue --
silent --stderr - | grep -o '"name"\:.*'
"name":"im.archer_tickets_
queue","vhost":"/rsa/im/integration","durable
":true,"auto_delete":false,"arguments":
{},"node":"sa@localhost"}
6. SSH to the SA web server host and enter the following command to check the number of
messages in the incident queue:
curl -k -u guest:guest
https://127.0.0.1:15671/api/queues/%2Frsa%2Fi
m%2Fintegration/im.archer_incident_queue -- silent --stderr -
| grep -o '"messages"\:[0-
9]*'
7. Confirm the above queues are populated with messages from the UCF.
l Type: runConnectionManager.bat
Note: Security Analytics Incident Management certificates are valid for two years.
2. If your certificates are expired, regenerate and copy the expired certificates.
2. Type: runConnectionManager.bat
3. Enter the number for Regenerate Security Analytics Incident Management Integration
Service Certificate.
4. In the Security Analytics Incident Management endpoint in Connection Manager, enter the
number for Edit Endpoint.
5. Enter Yes to copy the certificates automatically to the Security Analytics trust store.