Loading

SpyCloud Enterprise Protection

<div class="condensed-table">
| | |
| --- | --- |
| Version | 1.2.0 (View all) |
| Compatible Kibana version(s) | 8.13.0 or higher |
| Supported Serverless project types
What’s this? | Security
Observability |
| Subscription level
What’s this? | Basic |
| Level of support
What’s this? | Partner |

</div>

SpyCloud’s Enterprise Protection integration leverages recaptured darknet data to safeguard employees' digital identities by producing actionable insights to proactively prevent account takeover and follow-on targeted attacks before they happen.

The Elastic Agent uses the SpyCloud Enterprise Protection REST API to collect data.

This module has been tested against the latest SpyCloud Enterprise Protection API V2.

The SpyCloud integration collects three types of logs: Breach Catalog, Breach Record and Compass Malware Records.

  • https://spycloud-external.readme.io/sc-enterprise-api/reference/catalog-list[Breach Catalog] - a collection of third-party breach and malware data ingested into SpyCloud. The catalog contains thousands of breach objects, each of which contain metadata for a particular breach. A typical breach object contains a variety of metadata including a breach title, description, acquisition date, link to affected websites and many more data points.
  • https://spycloud-external.readme.io/sc-enterprise-api/reference/data-watchlist[Breach Record] - a collection of data assets extracted from third-party breach and malware data. These assets are grouped together to form a data record which represents a single user account or individual persona in parsed data.
  • https://spycloud-external.readme.io/sc-enterprise-api/reference/compass-data-get[Compass Malware Records] - a collection of data assets extracted from malware data that provides full visibility into infection events to enable post-infection remediation on compromised devices, users, and applications.

Elastic Agent must be installed. For more details and installation instructions, please refer to the Elastic Agent Installation Guide.

There are several options for installing and managing Elastic Agent:

With this approach, you install Elastic Agent and use Fleet in Kibana to define, configure, and manage your agents in a central location. We recommend using Fleet management because it makes the management and upgrade of your agents considerably easier.

With this approach, you install Elastic Agent and manually configure the agent locally on the system where it’s installed. You are responsible for managing and upgrading the agents. This approach is reserved for advanced users only.

You can run Elastic Agent inside a container, either with Fleet Server or standalone. Docker images for all versions of Elastic Agent are available from the Elastic Docker registry, and we provide deployment manifests for running on Kubernetes.

Please note, there are minimum requirements for running Elastic Agent. For more information, refer to the Elastic Agent Minimum Requirements.

  • Considering you already have a SpyCloud account, log in to your SpyCloud instance to obtain your API key. Navigate to Main > API, where you will find your API key under the Keys > API Key section.
  • To obtain the Base URL, navigate to Main > API and click on the View Docs link, your URL can be located within the API Reference section.
Note

Your system’s IP should be allowlisted by the SpyCloud team to be able to access the APIs and get the data.

  1. In Kibana navigate to Management > Integrations.

  2. In "Search for integrations" top bar, search for SpyCloud Enterprise Protection.

  3. Select the "SpyCloud Enterprise Protection" integration from the search results.

  4. Select "Add SpyCloud Enterprise Protection Integration" to add the integration.

  5. While adding the integration, if you want to collect Breach Catalog logs via REST API, please enter the following details:

    • URL

    • API Key

    • Interval

      or if you want to collect Breach Record logs via REST API, please enter the following details:

    • URL

    • API Key

    • Initial Interval

    • Interval

    • Severity

      or if you want to collect Compass logs via REST API, please enter the following details:

    • URL

    • API Key

    • Initial Interval

    • Interval

Note

By default, the URL is set to "https://api.spycloud.io/enterprise-v2[https://api.spycloud.io/enterprise-v2]".

This is the Breach Catalog dataset.

This is the Breach Record dataset.

This is the Compass dataset.