Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • How Tripwire Custom Workflow Automation Can Enhance Your Network Visibility
  • Data Breach
  • Vulnerabilities

How Tripwire Custom Workflow Automation Can Enhance Your Network Visibility

6 years ago David Gilmore
How Tripwire Custom Workflow Automation Can Enhance Your Network Visibility

Tripwire Enterprise is a powerful tool. It provides customers insight into nearly every aspect of their systems and devices. From change management to configuration and compliance, Tripwire can provide “eyes on” across the network.

Gathering that vast amount of data for analysis does not come without challenges. Customers have asked for better integration with their processes and third-party tools. With Tripwire Enterprise Integration Framework (TEIF), Tripwire has been able to provide customers the ability to integrate with their Security Information and Event Management (SIEM) tools and ITIL Change Management Systems (CMS).

Customers have been able to expand the value of their data by sending logs to a SIEM for analysis as well as allowing for the automatic reconciliation of changes and the creation of incidents in a CMS such as ServiceNow and Remedy. Can more be done? How can Tripwire Enterprise help the DevOPS team, SecDevOPS or any other group that asks?

Enter Tripwire Custom Workflow Automation.

What is Tripwire Custom Workflow Automation?

Tripwire Custom Workflow Automation (TWCA) is a solution that allows our customers and consultants the ability to create unique workflows where they can utilize all their existing solutions and Tripwire products without requiring extensive programming experience.

TWCA’s functionality can be expanded with ‘plugins’ which can be created by savvy customers or Tripwire consultants. It’s this functionality that makes the Tripwire Workflow Automation so powerful and flexible. If there is a need for some functionality that isn’t already available, a public interface is provided that anyone can use to add additional workflow steps.

First, it is XML-based, making it easy to read. It is also modular in design, allowing for easy expansion, as well as feature-rich out of the box. Lastly, it provides a Public Module Interface, allowing customers to create their own modules.

The choice of “Custom” in the name is not by accident. Customers can create their own workflows using common programming mechanisms (conditionals, looping, I/O, locating, scripting, and utility).

  <workflow name="PAM">
    <retrievePamNodes configuration="pam" output="pamNodes">
    <for list="${pamNodes}" item="node" condition="exists" continueOnError="false">
    <forEach list="" outVariable="panNode">
      <logMessage severity="info" source="TE">Processing Asset - ${pamNode}</logMessage>
      <checkoutNode configuration="pam" input="${node}" />
      <if condition="exists" value1="${ERROR_MSG}" negate="true">
        <runTECheck configuration="pam" input="${node}" />
        <retrieveContent configuration="pam" input="${node}" />
        <checkinNode configuration="pam" input="${node}" />
      </if>
      <else>
        <logMessage level="error" sourc="TE">
          An error occurred while processing node (${node}): ${ERROR_MSG}
        </logMessage>
      </else>
    </forEach>
  </workflow>

What can TWCA do?

Utilizing TCWA’s ability to run scripts, customers are able to connect to virtually any platform that provides API access. The data retrieved by the API call can then be stored in TE and tracked for change. The very first use case of this process was to analyze data collected from RedHat OpenShift to monitor the configuration of Kubernetes containers for a major financial customer. It worked so well that they engaged Tripwire to then analyze rule objects and categorize them as financial or non-financial, based on an XML feed from their ITSM.

Another customer use case was to verify that any detected change to etcpassword was only performed by their password vault application. This workflow queried the customer’s SIEM for events from the password vault and correlated that data with the change detected in Tripwire Enterprise. Any change that could not be correlated to a record in the SIEM is left unpromoted, resulting in an incident being created in their ITSM when TEIF was run later that evening.

TWCA has also helped customers working with cloud-based DevOps platforms. A workflow was developed to query Azure DevOps for release activity for servers with detected changes. Those changes were then correlated to an artifact in Artifactory; a manifest of the artifact was retrieved and used to promote the detected changes by element name and hash.

It’s not just Tripwire Enterprise that can benefit. It has been used to compare the discovered assets in Tripwire IP360 to Archer and then store the differences in Tripwire Enterprise. With that kind of data, the customer was able to see where there were gaps in their inventory discovery and tracking process. They were even discussing using the TWCA to take the data gleaned in the “1st” phase and fill in the gaps in Archer.

Do you have a workflow that you would like to automate? Tripwire Professional Services is ready to assist.

To learn more about Tripwire Custom Workflow Automation and Tripwire’s other products, click here.

About the Author: TWCA is the brainchild of Kelly Fessler, Architect & Manager, Tripwire Specialty Services and Sean Stallbaum, Sr. Services Solutions Engineer.  Thank you for their input and review, as well as the use case examples provided.

The post ” How Tripwire Custom Workflow Automation Can Enhance Your Network Visibility” appeared first on TripWire

Source:TripWire – David Gilmore

Tags: Cloud, TripWire

Continue Reading

Previous Feds Sound Alarm Over Emotet Attacks on State, Local Govs
Next Achieving Compliance with Qatar’s National Information Assurance Policy

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

6 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

[Webinar] Why Your AppSec Tools Miss the “Lethal Path” (and How to Fix It)

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Most Remediation Programs Never Confirm the Fix Actually Worked

8 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

9 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data

11 hours ago [email protected] (The Hacker News)

Recent Posts

  • Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday
  • Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation
  • [Webinar] Why Your AppSec Tools Miss the “Lethal Path” (and How to Fix It)
  • Most Remediation Programs Never Confirm the Fix Actually Worked
  • Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT