Loading

Sailpoint Identity Security Cloud

Version 0.3.0 beta:[] (View all)
Compatible Kibana version(s) 8.16.1 or higher
9.0.0 or higher
Supported Serverless project types
What's this?
Security
Observability
Subscription level
What's this?
Basic
Level of support
What's this?
Elastic

The Elastic integration for Sailpoint Identity Security Cloud enables real-time monitoring and analysis of identity security events within the SailPoint platform. This integration collects, processes, and visualizes audit logs, access activities, and identity lifecycle events to enhance security posture, compliance, and operational efficiency.

  • events: Provides audit data that includes actions such as USER_MANAGEMENT, PASSWORD_ACTIVITY, PROVISIONING, ACCESS_ITEM, SOURCE_MANAGEMENT, CERTIFICATION, AUTH, SYSTEM_CONFIG, ACCESS_REQUEST, SSO, WORKFLOW, SEGMENT and more.
  • Audit Events are records that a user took action in an IdentityNow tenant, or other service like IdentityAI. Audit Events are structurally and conceptually very similar to IdentityIQ'sAudit Events, but have evolved in several ways.
  • This data stream leverages the Sailpoint identity security cloud API's /v2024/search/events endpoint to retrieve event logs.

Log in to the application with an administrator account and generate a Personal Access Token (PAT). Personal access tokens are associated with a user in Sailpoint identity security cloud and inherit the user's permission level (e.g., Admin, Helpdesk, etc.) to determine access.

To create a Personal Access Token (PAT) using an admin account, follow the instructions provided in the official documentation:
Generate a Personal Access Token.

Event documents can be found by setting the following filter: event.dataset : "sailpoint_identity_sc.events"

ECS Field Reference

Please refer to the following document for detailed information on ECS fields.

The following non-ECS fields are used in events documents: