The integration is available in the Integration Hub in the Mimecast Administration Console. To add, edit, or delete the configuration, the user must have one of the following roles:
Prerequisites
Human Risk Command Center (available to Email Security MX customers) and/or Engage Subscription
-
One of the following Administration Console roles:
Global Sys Admin
Sys Admin - SD Full
Super Administrator
Full Administrator
Basic Administrator
Partner Administrator
Custom role with “Integrations Marketplace” having Read/Write enabled
Overview
The integration is configured in the Integration Hub in the Mimecast Administration Console.
Historical events will not be pulled from CyberArk– only events from the point of integration onward.
Authentication
To authenticate with CyberArk, we require two pieces of information:
-
The CyberArk base platform URL.
The User Interface (UI) will only accept the <your company name> portion of the FQDN.
An API Token. We recommend that the token is from a service user, so the token is not tied to a specific user/email address.
Before you are able to generate both of these in the CyberArk system, users will need to create an Oauth2 Server and a Service User to interact with the server.
OAuth2 Server
Information about creating an OAuth2 Server can be found on the Custom OAuth2 Server page. Here is how we did it:
To authenticate to the CyberArk instance we need to first create an OAuth2 server. The server can be created from Identity Administration | Apps and Widgets | Web apps.
Click “Add Web Apps“ and click “Add“ for Oauth2 Server in the “Custom” tab.
On the settings page, add and note an application ID (Your choice) in this case.
On the General usage page, set Client ID type to confidential. Note the Issuer (this will be used as the base URL).
On the Tokens page, set the token type to JwtRS225, and make sure Client Creds is set for the Auth Method. Set the token lifetime according to your organization's standards.
On the Scope page, add isp.audit.events:read to authorized scopes.
On the Advanced page, add the following to the script:
setClaim('tenant_id', TenantData.Get("CybrTenantID")); setClaim('aud', 'cyberark.isp.audit');
Save.
Service User
To create a Service User to interact with the Server:
Navigate to Identity Administration | Core Services | Users.
Add user.
Create your service user.
Assure to set the Status to:
password never expires.
is service account.
Once saved, navigate back to the Server app created. Navigate to its “Permissions“ tab. Add the service user created and make sure the Grant, View, Run, and Automatically Deploy checkmarks are selected.
Save.
To create the SIEM integration
Navigate to Administration | My Environment | integrations | Export to SIEM.
Configure the name and description, and select “Apply“.
On the following screen, note down the API base URL and API key.
Enter this into the Human Risk CyberArk integration page.
Comments
Please sign in to leave a comment.