Skip to main content

Aqua Security (SaaS)

Aqua Security (SaaS) is a container security tool that provides workload protection and security for containers, Kubernetes, and serverless applications. You can bring container, host, and security data from Aqua into Brinqa to construct a unified view of your attack surface, thus strengthening your cybersecurity posture.

This document details the information you must provide for the connector to authenticate with Aqua SaaS and how to obtain that information from Aqua. See create a data integration for step-by-step instructions on setting up the integration.

info

The Aqua SaaS connector differs from the Aqua Server connector only in its authentication method. Instead of a username and password, the Aqua SaaS connector uses an API key and API secret. The underlying APIs, data retrieved, operation options, and data mappings remain the same as the Aqua Server connector.

Required connection settings

When setting up a data integration, select Aqua SaaS from the Connector drop-down. If you cannot find the connector in the drop-down, make sure you have installed it first. You must provide the following information to authenticate Aqua SaaS with Brinqa:

  • API URL: Your organization’s Aqua SaaS API URL. If the URL is unknown, you can retrieve it by contacting Aqua Support. The default URL format is https://<server_name>.cloud.aquasec.com.

  • Auth URL: The Aqua API Server URL, specific to the region of your Aqua SaaS environment. The default URL format is https://<region>.api.cloudsploit.com. Replace <region> with the specific region of your Aqua API server. If your server is in the US, the URL would be https://api.cloudsploit.com/.

    The following table lists the Aqua SaaS login URL for each region. Please refer to Aqua Platform documentation for accuracy:

    Table 1: Aqua login URLs

    RegionURL
    UShttps://api.cloudsploit.com/
    EUhttps://eu-1.api.cloudsploit.com/
    Singaporehttps://asia-1.api.cloudsploit.com/
    Sydneyhttps://ap-2.api.cloudsploit.com/
  • API key and API secret: The API credentials associated with the Aqua SaaS account, which must have permissions to log in to the API server and return data. For additional information, see Generate Aqua SaaS API credentials.

Generate Aqua SaaS API credentials

For the Aqua SaaS connector to retrieve data from the Aqua API, you must provide API credentials with the necessary permissions. To do so, follow these steps:

  1. Log in to your organization's Aqua portal as an administrator.

  2. Navigate to Account Management > Settings > API Keys.

  3. Click Generate Key.

    Aqua SaaS generate key

  4. Provide a Description for the API key, and then click Create.

    Your API key and API secret display. You cannot view the API secret again after this. Copy and save it to a secure location.

    Aqua SaaS API credentials

  5. After generating the API key, click the kebab (three vertical dots) next to the new API key, and then click Edit.

  6. Disable the Global Permissions toggle and enable the following Granular Permissions, as these are the minimum permissions required to retrieve data from the Aqua API:

    • roles:assign

    • tokens:readwrite

      • Click the drop-down under the tokens-readwrite permission and select Read-Only.

      Aqua SaaS permissions

  7. Click Save.

note

If you do not have permissions to generate API credentials, contact your Aqua administrator. For additional information, see Aqua Platform documentation on API credentials and API key permissions.

Additional settings

The Aqua SaaS connector contains additional options for specific configuration:

  • Page size: The maximum number of records to get per API request. The default setting is 100. It is not recommended to go over 100.

  • Parallel requests: The maximum number of parallel API requests. The default setting is 4.

  • Request timeout (secs): The maximum time allotted, in seconds, before a request times out. The default setting is 120 seconds. Although it is not recommended, you can also enter zero (0) to disable timeouts.

  • Maximum retries: The maximum number of times that the integration attempts to connect to the Aqua API before giving up and reporting a failure. The default setting is 5.

Types of data to retrieve

The Aqua SaaS connector can retrieve the following types of data from the Aqua API:

Table 2: Data retrieved from Aqua SaaS

Connector ObjectRequiredMaps to Data Model
ContainerYesContainer
Container ImageYesContainer Image
FunctionNoNot mapped
HostYesHost
VulnerabilityYesVulnerability
Vulnerability DefinitionYesVulnerability Definition
info

For detailed steps on how to view the data retrieved from Aqua in the Brinqa Platform, see How to view your data.

Attribute mappings

Expand the sections below to view the mappings between the source and the Brinqa data model attributes.

Container

Table 3: Container attribute mappings

Source Field NameMaps to Attribute
account_idLocal variable
agent_existsLocal variable
aqua_serviceLocal variable
assurance_resultsLocal variable
cluster_nameLocal variable
compliantLocal variable
container_typetype
create_timefirstSeen
criticalLocal variable
highLocal variable
have_secretsLocal variable
host_enforcer_groupLocal variable
host_idtargets, Local variable
host_lnameLocal variable
host_namehost
iduid
image_assurance_compliantLocal variable
image_digestLocal variable
image_idLocal variable
image_nameimage
is_disallowedLocal variable
is_evaluatedLocal variable
is_privilegedLocal variable
is_profilingLocal variable
is_registeredLocal variable
is_rootLocal variable
ke_existsLocal variable
last_vuln_time_seenLocal variable
level3Local variable
lowLocal variable
malwareLocal variable
mediumLocal variable
modify_timelastSeen
mutableLocal variable
namename
namespace_nameLocal variable
network_modeLocal variable
origin_image_nameLocal variable
owner_nameowner
permissionLocal variable
registry_image_nameLocal variable
riskriskScore
risk_levelLocal variable
runtime_malware_countLocal variable
runtime_profile_nameLocal variable
scan_statusLocal variable
secretsLocal variable
sensitiveLocal variable
server_digestLocal variable
start_timefirstSeen
statusstatus
system_containerLocal variable
totalLocal variable
valid_digestLocal variable
vulnerabilitiesLocal variable
vulnerability_riskLocal variable
Container Image

Table 4: Container Image attribute mappings

Source Field NameMaps to Attribute
assurance_resultsLocal variable
asset_typeLocal variable
authorauthor
blacklistedLocal variable
cf_orgLocal variable
cf_spaceLocal variable
createdfirstSeen, sourceCreatedDate
disalloweddisallowed
digestdigest
docker_idLocal variable
dta_severity_scoreLocal variable
dta_skippedLocal variable
dta_skipped_reasonLocal variable
first_scan_failedLocal variable
high_vulnsLocal variable
image_build_dateLocal variable
image_uidLocal variable
labelsLocal variable
low_vulnsLocal variable
malwareLocal variable
metadataLocal variable
microenforcer_detectedLocal variable
mutableLocal variable
nameuid, name
neg_vulnsLocal variable
newer_image_existsLocal variable
osoperatingSystem
os_versionosVersion
parent_layers_idLocal variable
partial_resultsLocal variable
pending_disallowedLocal variable
permissionLocal variable
permission_lastupdateLocal variable
policy_failuresLocal variable
registryregistry
registry_typeregistryType
repositoryrepository
scan_datelastAssessed, lastSeen
scan_errorscanError
scan_statusscanStatus
security_findingsLocal variable
sensitive_dataLocal variable
sizeLocal variable
tagtag
typeLocal variable
vulns_foundLocal variable
whitelistedwhitelisted
Host

Table 5: Host attribute mappings

Source Field NameMaps to Attribute
account_idLocal variable
cloud_infomapped
cluster_idLocal variable
created_datesourceCreatedDate
iduid
is_agentlessagentless
is_enforcedenforced
is_gateway_existsgatewayExists
namename
node_iduid
permissionLocal variable
security_issuesmapped
statusLocal variable
typeLocal variable
Vulnerability

Table 6: Vulnerability attribute mappings

Source Field NameMaps to Attribute
acknowledgeScopeLocal variable
acknowledgedAuthorLocal variable
acknowledgedDateLocal variable
ackExpirationConfiguredAtLocal variable
ackExpirationConfiguredByLocal variable
ackExpirationDaysLocal variable
baseImageNameLocal variable
baseImageVulnerabilityLocal variable
cloudFoundryApplicationLocal variable
cloudFoundryOrganizationLocal variable
cloudFoundrySpaceLocal variable
clusterLocal variable
containerLocal variable
customSeveritycustomSeverity
deploymentLocal variable
enforcerGroupLocal variable
firstFoundfirstFound
hasNetworkAttackVectorLocal variable
heuristicRefIdLocal variable
imageDigesttargets, imageDigest
imageNametargets, imageName
imageUidtargets, imageUid
lastFoundlastFound
layerIdLocal variable
licensesLocal variable
namespacenamespace
nvdCvssv2SeverityLocal variable
nvdCvssv2VectorsLocal variable
nvdCvssv3ScoreLocal variable
nvdCvssv3SeverityLocal variable
nvdCvssv3VectorsLocal variable
organizationNameLocal variable
osLocal variable
osVersionLocal variable
publishDateSourceLocal variable
qualysIdsLocal variable
referencedByLocal variable
registryLocal variable
repositoryIdLocal variable
repositoryNameLocal variable
resourceresults, affected
resourceArchLocal variable
resourceHashLocal variable
resourcePathLocal variable
resourceTypeLocal variable
runningWorkloadsCountrunningWorkloadsCount
scanIdLocal variable
severitysourceSeverity
siblingPackageLocal variable
solutionrecommendation
statusproviderStatus, sourceStatus, status
temporalVectorLocal variable
vendorCvssv2ScoreLocal variable
vendorCvssv2SeverityLocal variable
vendorCvssv2VectorsLocal variable
vendorCvssv3ScoreLocal variable
vendorCvssv3SeverityLocal variable
vendorCvssv3VectorsLocal variable
vulnerabilityIdLocal variable
vulnerabilityNamename, type, cveIds, cveRecords
vulnerabilityResourceIdLocal variable
workloadshasRunningWorkloads
Vulnerability Definition

Table 7: Vulnerability Definition attribute mappings

Source Field NameMaps to Attribute
aquaEvalScoreLocal variable
aquaScoreLocal variable
aquaUniqueIdLocal variable
aquaVectorsLocal variable
cisaDueDatecisaDueDate
cisaPublishedDatecisaAddedDate
classificationclassification
cpeaffected
descriptiondescription
epssPercentileepssPercentile
epssScoreepssScore
exploitAvailabilityexploitability, references
exploitTypecisaExploited, exploitability, exploitType
fixVersionfixedVersion
formatLocal variable
hasNetworkAttackVectorLocal variable
installedVersionaffectedVersion
modificationDatesourceLastModified
nvdCvssv2ScorecvssV2BaseScore
nvdUrlreferences
publishDatepublishedDate
remoteExploitremoteExploit
resourceresults, affected
severityseverity, sourceSeverity, severityScore
vendorCvssv3SeverityvendorSeverity
vendorStatementvendorStatement
vendorUrlreferences
vulnerabilityNamename, type, cveIds, cveRecords
Local variable

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Data lifecycle management (DLM) strategy

The following table details the DLM strategy for the Aqua SaaS connector:

Table 8: Aqua SaaS DLM strategy

Connector ObjectInactivity ConditionPurge PolicySummary
ContainerLAST_SEEN NOT IN LAST 7 DAYS30 days after inactivityUses the LAST_SEEN attribute to identify containers that are inactive within the last 7 days, and then purges the records after 30 days of inactivity.
Container ImageLAST_SEEN NOT IN LAST 7 DAYS30 days after inactivityUses the LAST_SEEN attribute to identify container images that are inactive within the last 7 days, and then purges the records after 30 days of inactivity.
HostLAST_SEEN NOT IN LAST 7 DAYS30 days after inactivityUses the LAST_SEEN attribute to identify hosts that are inactive within the last 7 days, and then purges the records after 30 days of inactivity.
VulnerabilityLAST_CAPTURED NOT IN LAST 7 DAYS30 days after inactivityUses the LAST_CAPTURED attribute to identify vulnerabilities that are inactive within the last 7 days, and then purges the records after 30 days of inactivity.

Operation options

The Aqua SaaS connector supports the following operation options. See connector operation options for information about how to apply them.

Table 9: Aqua SaaS connector operation options

Connector ObjectOptionAll Possible valuesDescriptionExample
Container ImagenameAny container nameRetrieves only containers with the specified name.Key: name Value: kubernetes. This key and value combination only retrieves containers named kubernetes.
repositoryAny container repositoryRetrieves only containers from the specified repository.Key: repository Value: angular-spring. This key and value combination only retrieves containers form the angular-spring repository.
Vulnerabilityexploit_availabilityavailable, not availableFilter vulnerabilities by whether or not that have an exploit available, as determined by Aqua.Key: exploit_availability Value: available This key and value combination only retrieves vulnerabilities that have an exploit available.
exploit_typedos, local, remote, web appsA comma-separated list of types of exploits. Filter vulnerabilities by their exploit type.Key: exploit_type Value: dos,remote. This key and value combination only retrieves vulnerabilities with the dos or remote exploit type.
include_vpatch_info1Retrieves suppressed findings from Aqua.Key: include_vpatch_info Value: 1. This key and value combination retrieves suppressed findings from Aqua.
namespace_namesAny Aqua resource namespace nameA comma-separated list of namespace names. Retrieves only vulnerabilities from the specified namespace names. For additional information on namespaces, see Aqua documentation.Key: namespace_names Value: default,kube-system,kube-public. This key and value combination only retrieves vulnerabilities from the specified namespaces.
Vulnerability Definitionasset_typesimages, hosts, functions, code repositories, containers, vms, kubernetes resourcesA comma-separated list of asset types. Filter vulnerabilities by their specified asset type.Key: asset_types Value: hosts,images. This key and value combination only retrieves vulnerabilities associated with hosts or images.
exploit_availabilityavailable, not availableFilter vulnerabilities by whether or not that have an exploit available, as determined by Aqua.Key: exploit_availability Value: available This key and value combination only retrieves vulnerabilities that have an exploit available.
exploit_typedos, local, remote, web appsA comma-separated list of types of exploits. Filter vulnerabilities by their exploit type.Key: exploit_type Value: dos,remote. This key and value combination only retrieves vulnerabilities with the dos or remote exploit type.
include_vpatch_info1Retrieves suppressed findings from Aqua.Key: include_vpatch_info Value: 1. This key and value combination retrieves suppressed findings from Aqua.
note

The option keys and values are case-sensitive as they are shown in this documentation.

APIs

The Aqua SaaS connector uses the Aqua Enterprise API v2. Specifically, it uses the following endpoints:

Table 10: Aqua SaaS API Endpoints

Connector ObjectAPI Endpoints
ContainerGET /api/v2/containers
Container ImageGET /api/v2/images/
FunctionGET /api/v2/serverless/functions
HostGET /api/v2/infrastructure
VulnerabilityPOST api/v2/risks/vulnerabilities/exporters/hosts/export
GET api/v2/risks/vulnerabilities/exporters/hosts/jobs/exportId
POST api/v2/risks/vulnerabilities/exporters/hosts/stream
Vulnerability DefinitionPOST api/v2/risks/vulnerabilities/exporters/hosts/export
GET api/v2/risks/vulnerabilities/exporters/hosts/jobs/exportId
POST api/v2/risks/vulnerabilities/exporters/hosts/stream

Changelog

The Aqua SaaS connector has undergone the following changes:

Table 11: Aqua SaaS connector changelog

VersionDescription
4.0.3- Added the NAMESPACE attribute to the Vulnerability object.
- Added a new operation option to filter vulnerabilities by their namespace: namespace_names
4.0.2Enhanced the connector to retrieve suppressed findings from Aqua. As a result, the following operation option has been added to the Vulnerability object: include_vpatch_info
4.0.1Added the HAS_RUNNING_WORKLOADS and RUNNING_WORKLOADS_COUNT attributes to the Vulnerability object.
4.0.0- Transitioned the Aqua SaaS connector to fully use the Aqua Enterprise API v2 to enhance performance and reliability.
- Added two new operation options to filter vulnerabilities: exploit_availability and exploit_type.
3.1.3Added support for Data lifecycle management to the Container, Container Image, Host, and Vulnerability objects.
3.1.2Fixed an issue where the Vulnerability Definition object sync was failing.
3.1.1Code clean up and general maintenance.
3.1.0Initial Integration+ release.