Cyberwatch
Integrate Cyberwatch to retrieve vulnerability management data
The Cyberwatch connector allows you to retrieve asset inventory and vulnerability data detected by your Cyberwatch platform directly into OverSOC.
Objective
The Cyberwatch connector retrieves the following information:
- Asset inventory (servers, workstations, network equipment)
- Detected vulnerabilities with CVE references
- Compliance score and remediation priorities
Prerequisites
- Access to your Cyberwatch instance
- Administrator permissions to access inventory data
- Ability to generate API keys
Information to Provide in OverSOC
| Field | Description |
|---|---|
| API URL | Base URL of your Cyberwatch instance (e.g., https://cyberwatch.example.com) |
| API Key | API key for authentication |
| API Secret | API secret for authentication |
Procedure
Generate API Credentials in Cyberwatch
- Sign in to your Cyberwatch instance.
- Go to Profile > API Keys.
- Click "View my API keys" or "+ Add" to create a new key.
- Generate the API credentials:
- API Access Key ID: Auto-generated identifier.
- API Secret Access Key: Auto-generated secret.
- Optionally, export the credentials as an
api.conffile for reference. - Copy both the API Access Key ID and API Secret Access Key immediately.
- For OverSOC, ensure the API key has "Read only" access level.
Retrieve the API URL
- The API URL is the base URL of your Cyberwatch instance.
- Example:
https://cyberwatch.example.comorhttps://app.cyberwatch.iofor the SaaS version.
Configure the Connector in OverSOC
- In OverSOC, go to Data Sources Settings > Sources.
- Select Cyberwatch and click Configure.
- Fill in the three required fields:
- API URL: Base URL of your Cyberwatch instance.
- API Key: Your API Access Key ID.
- API Secret: Your API Secret Access Key.
- Click Save Configuration.
Official Documentation
For additional information, refer to the Cyberwatch API documentation.
Required Permissions
The API credentials must have the following permissions:
- Read access to asset inventory
- Read access to vulnerabilities and detections
- Read access to compliance reports