Google Security Operations

Access Levels: Advanced | Enterprise

The Censys connector for Google Security Operations (SecOps) enables you to connect Attack Surface Management (ASM) logbook and risk events with SecOps. Thus, you can monitor your attack surface events from within Google SecOps.

Prerequisites

Before you begin, make sure you have your Google Security Operations ingestion account email, customer ID, and private key.

To find your account email and private key:

  1. Go to the Google Security Operations console, and go to Settings > Collection Agents.
  2. Locate the Ingestion Authentication File and download it.
  3. Within the file, the ingestion email address is listed in the client_email field.
  4. Within the file, the private key is listed in the private_key field. Make sure to include '-----BEGIN PRIVATE KEY-----', '-----END PRIVATE KEY-----\n' and everything in between.

To find your customer ID:

  1. In the Google Security Operations console, navigate to Settings > Profile.
  2. Under Organization Details, note your customer ID.

Configure the integration in Censys ASM

  1. Go to the ASM web console and click Integrations.
  2. Locate Google Security Operations and click Set Up.
  3. On the Authentication page, enter the following:
    1. Google Security Operations Ingestion Account Email: Enter the account email you obtained from the Ingestion Authentication File.

    2. Customer ID: Enter the customer ID you obtained from your SecOps profile.

    3. Private Key: Enter the private key you obtained from the Ingestion Authentication File.

  4. At the bottom of the Authentication page, click Sign in with Google.
  5. Click Next Step.
  6. On the Default Set up page, select whether you want to receive logbook events, risk events, or both within Google SecOps.
  7. Click Submit, then click Done.

Modify the integration

If you need to make changes to your integration, follow the configuration steps above.

Query examples

The integration automatically polls Censys for new events, which are sent to Google SecOps.

All Censys ASM events

This query will show all events that have been ingested from Censys ASM.

metadata.product_name= “Censys Attack Surface Management”

Risk events

These events track whether a risk instance has been opened, closed, or updated in your attack surface. To show all risk events ingested from Censys ASM, you can use the following query:

metadata.product_name= "Censys Attack Surface Management" AND security_result.category = "POLICY_VIOLATION"

To filter by severity, you can add the following to the query above. This will only show events with High severities in ASM.

AND security_result.severity = "HIGH"

Logbook events

These events track which hosts have been associated and disassociated with the attack surface. To show all host associate and host disassociate events, you can use the following query:

metadata.product_name= "Censys Attack Surface Management" AND (metadata.description = "ASSOCIATE" OR metadata.description = "DISASSOCIATE"

You can use the following query to filter for only associate events. Replacing ASSOCIATE with DISASSOCIATE filters for only disassociate events.

metadata.product_name= "Censys Attack Surface Management" AND metadata.description = "ASSOCIATE"

Event fields

The following tables detail the objects sent to the custom log analytics tables.

Risk events

UDM Field

Description

security_result.description

Risk Type Name

security_result.first_discovered_time

First Seen by Censys

security_result.last_discovered_time

Last Seen by Censys

security_result.severity

Risk Severity

security_result.threat_id

Risk ID

security_result.threat_status

Indicates whether the risk is open or closed

ACTIVE: Open in Censys

CLEARED: Closed in Censys