Loading

Google SecOps

Version 0.1.0 beta:[] (View all)
Compatible Kibana version(s) 8.18.0 or higher
9.0.0 or higher
Supported Serverless project types
What's this?
Security
Observability
Subscription level
What's this?
Basic
Level of support
What's this?
Elastic

Google SecOps is a cloud-based service designed for enterprises to retain, analyze, and search large volumes of security and network telemetry. It normalizes, indexes, and correlates data to detect threats. Investigate their scope and cause, and provide remediation through pre-built integrations. The platform enables security analysts to examine aggregated security information, search across domains, and mitigate threats throughout their lifecycle.

The Google SecOps integration collects alerts using the Detection Engine API.

This module has been tested against the Google SecOps version v2.

This integration collects the following logs:

  • Alerts - This method enables users to retrieve alerts from Google SecOps.

Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. Agentless deployments provide a means to ingest data while avoiding the orchestration, management, and maintenance needs associated with standard ingest infrastructure. Using an agentless deployment makes manual agent deployment unnecessary, allowing you to focus on your data instead of the agent that collects it.

For more information, refer to Agentless integrations and Agentless integrations FAQ

Elastic Agent must be installed. For more details and installation instructions, please refer to the Elastic Agent Installation Guide.

There are several options for installing and managing Elastic Agent:

With this approach, you install Elastic Agent and use Fleet in Kibana to define, configure, and manage your agents in a central location. We recommend using Fleet management because it makes the management and upgrade of your agents considerably easier.

With this approach, you install Elastic Agent and manually configure the agent locally on the system where it’s installed. You are responsible for managing and upgrading the agents. This approach is reserved for advanced users only.

You can run Elastic Agent inside a container, either with Fleet Server or standalone. Docker images for all versions of Elastic Agent are available from the Elastic Docker registry, and we provide deployment manifests for running on Kubernetes.

Please note, there are minimum requirements for running Elastic Agent. For more information, refer to the Elastic Agent Minimum Requirements.

  • Create Google SecOps service account Steps to create.
  • Chronicle API must be enabled.
  • Open GCP Console, Then go to IAM.
  • In View By Main Tab > Click GRANT ACCESS.
  • Add Service Account name in New Principals.
  • In Assign Role, Select Owner.
  • Click Save

This integration will make use of the following oauth2 scope:

  • https://www.googleapis.com/auth/chronicle-backstory

Once Service Account credentials are downloaded as a JSON file, then the integration can be setup to collect data. For more details, please refer Google Chronicle Detection Engine API.

If installing in GCP-Cloud environment, credentials are not necessary but make sure the account linked with the VM has all the required IAM permissions. Steps to Set up Application Default Credentials.

  1. In Kibana navigate to Management > Integrations.
  2. In "Search for integrations" top bar, search for Google SecOps.
  3. Select the "Google SecOps" integration from the search results.
  4. Select "Add Google SecOps" to add the integration.
  5. Add all the required integration configuration parameters, including the URL, Credentials Type, and Credentials, to enable data collection.
  6. Select "Save and continue" to save the integration.
Note

The default URL is https://backstory.googleapis.com, but this may vary depending on your region. Please refer to the Documentation to find the correct URL for your region.

This is the alert dataset.