Skip to content

Commit 74ef2bb

Browse files
moxarth-rathodrobester0403
authored andcommitted
[Tenable SC] Add support for Accept Risk Status filter in vulnerability data stream (elastic#14890)
add support `Accept Risk Status` filter in vulnerability data stream. Refer the documentation [1] for details on adding the query. [1] https://docs.tenable.com/security-center/api/Query.htm#query_POST
1 parent e42a85a commit 74ef2bb

File tree

7 files changed

+50
-20
lines changed

7 files changed

+50
-20
lines changed

packages/tenable_sc/_dev/deploy/docker/files/config.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ rules:
1919
methods: [POST]
2020
request_headers:
2121
x-apikey: accesskey=some_access_key; secretkey=some_secret_key
22+
request_body: /.*filterName":"acceptRiskStatus","operator":"=","value":"notAccepted".*/
2223
responses:
2324
- status_code: 200
2425
body: |

packages/tenable_sc/changelog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
# newer versions go on top
2+
- version: "1.30.0"
3+
changes:
4+
- description: Add support for "Accept Risk Status" filter in vulnerability data stream.
5+
type: enhancement
6+
link: https://github.com/elastic/integrations/pull/14890
27
- version: "1.29.0"
38
changes:
49
- description: Update Kibana constraint to support 9.0.0.

packages/tenable_sc/data_stream/vulnerability/agent/stream/httpjson.yml.hbs

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,15 @@ request.transforms:
4141
"value": "0:[[div (add (add (toInt (now).Unix) (mul (toInt -1) (toInt ((now (parseDuration "-{{initial_interval}}")).Unix)))) (toInt 86399)) 86400]]"
4242
}
4343
value_type: json
44+
- append:
45+
target: body.query.filters
46+
value: >-
47+
{
48+
"filterName":"acceptRiskStatus",
49+
"operator":"=",
50+
"value": "{{accept_risk_status}}"
51+
}
52+
value_type: json
4453
- set:
4554
target: body.query.type
4655
value: 'vuln'

packages/tenable_sc/data_stream/vulnerability/manifest.yml

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,21 @@ type: logs
33
streams:
44
- input: httpjson
55
vars:
6+
- name: accept_risk_status
7+
type: select
8+
title: Accept Risk Status
9+
description: Whether to include "all" vulnerabilities, only vulnerabilities that have been "accepted" as a risk, or vulnerabilities that are "not accepted" as a risk.
10+
multi: false
11+
options:
12+
- value: all
13+
text: All
14+
- value: accepted
15+
text: Accepted
16+
- value: notAccepted
17+
text: Not Accepted
18+
required: false
19+
show_user: true
20+
default: notAccepted
621
- name: tags
722
type: text
823
title: Tags

packages/tenable_sc/data_stream/vulnerability/sample_event.json

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,34 @@
11
{
22
"@timestamp": "2021-09-25T16:08:45.000Z",
33
"agent": {
4-
"ephemeral_id": "4e859f73-e37a-4b88-926b-cb67d01e20e1",
5-
"id": "f25d13cd-18cc-4e73-822c-c4f849322623",
6-
"name": "docker-fleet-agent",
4+
"ephemeral_id": "c643a0a5-89d8-4a1e-81f0-63a129501012",
5+
"id": "ad0cabc5-f33b-4982-aba6-069a206e7c08",
6+
"name": "elastic-agent-82139",
77
"type": "filebeat",
8-
"version": "8.10.1"
8+
"version": "8.13.0"
99
},
1010
"data_stream": {
1111
"dataset": "tenable_sc.vulnerability",
12-
"namespace": "ep",
12+
"namespace": "94688",
1313
"type": "logs"
1414
},
1515
"ecs": {
1616
"version": "8.11.0"
1717
},
1818
"elastic_agent": {
19-
"id": "f25d13cd-18cc-4e73-822c-c4f849322623",
19+
"id": "ad0cabc5-f33b-4982-aba6-069a206e7c08",
2020
"snapshot": false,
21-
"version": "8.10.1"
21+
"version": "8.13.0"
2222
},
2323
"event": {
2424
"agent_id_status": "verified",
2525
"category": [
2626
"threat",
2727
"vulnerability"
2828
],
29-
"created": "2023-09-22T18:02:19.559Z",
29+
"created": "2025-07-16T08:29:40.843Z",
3030
"dataset": "tenable_sc.vulnerability",
31-
"ingested": "2023-09-22T18:02:22Z",
31+
"ingested": "2025-07-16T08:29:43Z",
3232
"kind": "event",
3333
"original": "{\"acceptRisk\":\"0\",\"baseScore\":\"0.0\",\"bid\":\"\",\"checkType\":\"remote\",\"cpe\":\"\",\"cve\":\"CVE-1999-0524\",\"cvssV3BaseScore\":\"0.0\",\"cvssV3TemporalScore\":\"\",\"cvssV3Vector\":\"AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N\",\"cvssVector\":\"AV:L/AC:L/Au:N/C:N/I:N/A:N\",\"description\":\"The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols.\\n\\nTimestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.\",\"dnsName\":\"_gateway.lxd\",\"exploitAvailable\":\"No\",\"exploitEase\":\"\",\"exploitFrameworks\":\"\",\"family\":{\"id\":\"30\",\"name\":\"General\",\"type\":\"active\"},\"firstSeen\":\"1551284872\",\"hasBeenMitigated\":\"0\",\"hostUniqueness\":\"repositoryID,ip,dnsName\",\"ip\":\"10.238.64.1\",\"ips\":\"10.238.64.1\",\"lastSeen\":\"1632586125\",\"macAddress\":\"00:16:3e:a1:12:f7\",\"netbiosName\":\"\",\"operatingSystem\":\"Linux Kernel 2.6\",\"patchPubDate\":\"-1\",\"pluginID\":\"10114\",\"pluginInfo\":\"10114 (0/1) ICMP Timestamp Request Remote Date Disclosure\",\"pluginModDate\":\"1570190400\",\"pluginName\":\"ICMP Timestamp Request Remote Date Disclosure\",\"pluginPubDate\":\"933508800\",\"pluginText\":\"\\u003cplugin_output\\u003eThe remote clock is synchronized with the local clock.\\n\\u003c/plugin_output\\u003e\",\"port\":\"0\",\"protocol\":\"ICMP\",\"recastRisk\":\"0\",\"repository\":{\"dataFormat\":\"IPv4\",\"description\":\"\",\"id\":\"1\",\"name\":\"Live\",\"sciID\":\"1\"},\"riskFactor\":\"None\",\"seeAlso\":\"\",\"severity\":{\"description\":\"Informative\",\"id\":\"0\",\"name\":\"Info\"},\"solution\":\"Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).\",\"stigSeverity\":\"\",\"synopsis\":\"It is possible to determine the exact time set on the remote host.\",\"temporalScore\":\"\",\"uniqueness\":\"repositoryID,ip,dnsName\",\"uuid\":\"\",\"version\":\"1.48\",\"vprContext\":\"[{\\\"id\\\":\\\"age_of_vuln\\\",\\\"name\\\":\\\"Vulnerability Age\\\",\\\"type\\\":\\\"string\\\",\\\"value\\\":\\\"730 days +\\\"},{\\\"id\\\":\\\"cvssV3_impactScore\\\",\\\"name\\\":\\\"CVSS v3 Impact Score\\\",\\\"type\\\":\\\"number\\\",\\\"value\\\":0},{\\\"id\\\":\\\"exploit_code_maturity\\\",\\\"name\\\":\\\"Exploit Code Maturity\\\",\\\"type\\\":\\\"string\\\",\\\"value\\\":\\\"Unproven\\\"},{\\\"id\\\":\\\"product_coverage\\\",\\\"name\\\":\\\"Product Coverage\\\",\\\"type\\\":\\\"string\\\",\\\"value\\\":\\\"Very High\\\"},{\\\"id\\\":\\\"threat_intensity_last_28\\\",\\\"name\\\":\\\"Threat Intensity\\\",\\\"type\\\":\\\"string\\\",\\\"value\\\":\\\"Very Low\\\"},{\\\"id\\\":\\\"threat_recency\\\",\\\"name\\\":\\\"Threat Recency\\\",\\\"type\\\":\\\"string\\\",\\\"value\\\":\\\"No recorded events\\\"},{\\\"id\\\":\\\"threat_sources_last_28\\\",\\\"name\\\":\\\"Threat Sources\\\",\\\"type\\\":\\\"string\\\",\\\"value\\\":\\\"No recorded events\\\"}]\",\"vprScore\":\"0.8\",\"vulnPubDate\":\"788961600\",\"xref\":\"CWE #200\"}",
3434
"type": [
@@ -213,4 +213,4 @@
213213
},
214214
"severity": "Info"
215215
}
216-
}
216+
}

packages/tenable_sc/docs/README.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -425,34 +425,34 @@ An example event for `vulnerability` looks as following:
425425
{
426426
"@timestamp": "2021-09-25T16:08:45.000Z",
427427
"agent": {
428-
"ephemeral_id": "4e859f73-e37a-4b88-926b-cb67d01e20e1",
429-
"id": "f25d13cd-18cc-4e73-822c-c4f849322623",
430-
"name": "docker-fleet-agent",
428+
"ephemeral_id": "c643a0a5-89d8-4a1e-81f0-63a129501012",
429+
"id": "ad0cabc5-f33b-4982-aba6-069a206e7c08",
430+
"name": "elastic-agent-82139",
431431
"type": "filebeat",
432-
"version": "8.10.1"
432+
"version": "8.13.0"
433433
},
434434
"data_stream": {
435435
"dataset": "tenable_sc.vulnerability",
436-
"namespace": "ep",
436+
"namespace": "94688",
437437
"type": "logs"
438438
},
439439
"ecs": {
440440
"version": "8.11.0"
441441
},
442442
"elastic_agent": {
443-
"id": "f25d13cd-18cc-4e73-822c-c4f849322623",
443+
"id": "ad0cabc5-f33b-4982-aba6-069a206e7c08",
444444
"snapshot": false,
445-
"version": "8.10.1"
445+
"version": "8.13.0"
446446
},
447447
"event": {
448448
"agent_id_status": "verified",
449449
"category": [
450450
"threat",
451451
"vulnerability"
452452
],
453-
"created": "2023-09-22T18:02:19.559Z",
453+
"created": "2025-07-16T08:29:40.843Z",
454454
"dataset": "tenable_sc.vulnerability",
455-
"ingested": "2023-09-22T18:02:22Z",
455+
"ingested": "2025-07-16T08:29:43Z",
456456
"kind": "event",
457457
"original": "{\"acceptRisk\":\"0\",\"baseScore\":\"0.0\",\"bid\":\"\",\"checkType\":\"remote\",\"cpe\":\"\",\"cve\":\"CVE-1999-0524\",\"cvssV3BaseScore\":\"0.0\",\"cvssV3TemporalScore\":\"\",\"cvssV3Vector\":\"AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N\",\"cvssVector\":\"AV:L/AC:L/Au:N/C:N/I:N/A:N\",\"description\":\"The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols.\\n\\nTimestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.\",\"dnsName\":\"_gateway.lxd\",\"exploitAvailable\":\"No\",\"exploitEase\":\"\",\"exploitFrameworks\":\"\",\"family\":{\"id\":\"30\",\"name\":\"General\",\"type\":\"active\"},\"firstSeen\":\"1551284872\",\"hasBeenMitigated\":\"0\",\"hostUniqueness\":\"repositoryID,ip,dnsName\",\"ip\":\"10.238.64.1\",\"ips\":\"10.238.64.1\",\"lastSeen\":\"1632586125\",\"macAddress\":\"00:16:3e:a1:12:f7\",\"netbiosName\":\"\",\"operatingSystem\":\"Linux Kernel 2.6\",\"patchPubDate\":\"-1\",\"pluginID\":\"10114\",\"pluginInfo\":\"10114 (0/1) ICMP Timestamp Request Remote Date Disclosure\",\"pluginModDate\":\"1570190400\",\"pluginName\":\"ICMP Timestamp Request Remote Date Disclosure\",\"pluginPubDate\":\"933508800\",\"pluginText\":\"\\u003cplugin_output\\u003eThe remote clock is synchronized with the local clock.\\n\\u003c/plugin_output\\u003e\",\"port\":\"0\",\"protocol\":\"ICMP\",\"recastRisk\":\"0\",\"repository\":{\"dataFormat\":\"IPv4\",\"description\":\"\",\"id\":\"1\",\"name\":\"Live\",\"sciID\":\"1\"},\"riskFactor\":\"None\",\"seeAlso\":\"\",\"severity\":{\"description\":\"Informative\",\"id\":\"0\",\"name\":\"Info\"},\"solution\":\"Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).\",\"stigSeverity\":\"\",\"synopsis\":\"It is possible to determine the exact time set on the remote host.\",\"temporalScore\":\"\",\"uniqueness\":\"repositoryID,ip,dnsName\",\"uuid\":\"\",\"version\":\"1.48\",\"vprContext\":\"[{\\\"id\\\":\\\"age_of_vuln\\\",\\\"name\\\":\\\"Vulnerability Age\\\",\\\"type\\\":\\\"string\\\",\\\"value\\\":\\\"730 days +\\\"},{\\\"id\\\":\\\"cvssV3_impactScore\\\",\\\"name\\\":\\\"CVSS v3 Impact Score\\\",\\\"type\\\":\\\"number\\\",\\\"value\\\":0},{\\\"id\\\":\\\"exploit_code_maturity\\\",\\\"name\\\":\\\"Exploit Code Maturity\\\",\\\"type\\\":\\\"string\\\",\\\"value\\\":\\\"Unproven\\\"},{\\\"id\\\":\\\"product_coverage\\\",\\\"name\\\":\\\"Product Coverage\\\",\\\"type\\\":\\\"string\\\",\\\"value\\\":\\\"Very High\\\"},{\\\"id\\\":\\\"threat_intensity_last_28\\\",\\\"name\\\":\\\"Threat Intensity\\\",\\\"type\\\":\\\"string\\\",\\\"value\\\":\\\"Very Low\\\"},{\\\"id\\\":\\\"threat_recency\\\",\\\"name\\\":\\\"Threat Recency\\\",\\\"type\\\":\\\"string\\\",\\\"value\\\":\\\"No recorded events\\\"},{\\\"id\\\":\\\"threat_sources_last_28\\\",\\\"name\\\":\\\"Threat Sources\\\",\\\"type\\\":\\\"string\\\",\\\"value\\\":\\\"No recorded events\\\"}]\",\"vprScore\":\"0.8\",\"vulnPubDate\":\"788961600\",\"xref\":\"CWE #200\"}",
458458
"type": [

packages/tenable_sc/manifest.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ format_version: "3.0.2"
22
name: tenable_sc
33
title: Tenable Security Center
44
# The version must be updated in the input configuration templates as well, in order to set the correct User-Agent header. Until elastic/kibana#121310 is implemented we will have to manually sync these.
5-
version: "1.29.0"
5+
version: "1.30.0"
66
description: |
77
Collect data from Tenable Security Center with Elastic Agent.
88
type: integration

0 commit comments

Comments
 (0)