Skip to main content

Rapid7 Nexpose Data Warehouse

Rapid7 Nexpose is an on-premises vulnerability scanner, which allows you to export data to an external data warehouse. You can use the Rapid7 Nexpose Data Warehouse connector to bring host and security data from your data warehouse into Brinqa to construct a unified view of your attack surface and strengthen your cybersecurity posture.

This document details the information you must provide for the connector to authenticate with Rapid7 Nexpose and how to obtain that information from Rapid7. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select Rapid7 Nexpose Data Warehouse from the Connector drop-down. If you cannot find the connector in the drop-down, make sure you have installed it first. You must provide the following information to authenticate Rapid7 Nexpose Data Warehouse with Brinqa:

  • Server name: The URL of your PostgreSQL server.

  • Server port: The TCP/IP port of your PostgreSQL server. The server port defaults to 5432.

  • Database name: The name of your Nexpose data warehouse database.

  • User and Password: The login credentials for the PostgreSQL Server. The user must have read access to the database.

Additional settings

The Rapid7 Nexpose Data Warehouse connector contains additional options for specific configuration:

  • Fetch size: Set the number of rows per batch during query processing. The default is 1000.

  • Use SSL: Use a SSL connection to the target database during the data import process. This ensures that all data transmitted from the warehouse is encrypted in transit.

  • Skip certificate verification: Select this option to allow for untrusted certificates.

Types of data to retrieve

The Rapid7 Nexpose Data Warehouse connector can retrieve the following types of data from the data warehouse:

Table 1: Data retrieved from Rapid7 Nexpose

Connector ObjectRequiredMaps to Data Model
HostYesHost
VulnerabilityYesVulnerability
Vulnerability DefinitionYesVulnerability Definition
info

The Rapid7 Nexpose Data Warehouse connector does not currently support operation options for the types of data it retrieves.

For detailed steps on how to view the data retrieved from Rapid7 Nexpose Data Warehouse in the Brinqa Platform, see How to view your data.

Attribute mappings

Click the tabs below to view the mappings between the source and the Brinqa data model attributes.

Host

Table 2: Host attribute mappings

Source Field NameMaps to Attribute
address.getIpAddressipAddresses, privateIpAddresses
address.getMacAddressmacAddresses
assessed_for_policiesLocal variable
assessed_for_vulnerabilitiesLocal variable
assetIduid
associatedValues.assetGroups.getLocal variable
associatedValues.tags.gettags
categoriescategories
credential_statusLocal variable
descriptiondescription
hostnamehostnames, publicDnsName, privateDnsName
instance idcloudInstanceId
last_assessed_for_vulnerabilitieslastSeen, lastScanned
namename
os_architectureLocal variable
os_cpeLocal variable
os_descriptionos
os_familyLocal variable
os_nameLocal variable
os_systemLocal variable
os_typeLocal variable
os_vendorLocal variable
os_versionLocal variable
publicIpAddress.getpublicIpAddress
risk_modifierLocal variable
sitesLocal variable
statusstatus
unique identifiersLocal variable
Vulnerability

Table 3: Vulnerability attribute mappings

Source Field NameMaps to Attribute
asset_idtargets
first_foundfirstFound
host_namehostnames
ip_addressipAddresses
keyLocal variable
last_foundlastFound
nexpose_idtype
portport
proofresults
protocolprotocol
serviceLocal variable
severitysourceSeverity
severityScoreseverity
statusstatus, statusCategory
uiduid
vulnerability_idLocal variable
Vulnerability Definition

Table 4: Vulnerability Definition attribute mappings

Source Field NameMaps to Attribute
categoriescategories
cvss_scorecvssV2BaseScore
cvss_vectorcvssV2Vector
cvss_v3_scorecvssV3BaseScore
cvss_v3_vectorcvssV3Vector
cvssv2.getAttackComplexitycvssV2AccessComplexity
cvssv2.getAttackVectorcvssV2AttackVector
cvssv2.getAuthenticationcvssV2Authentication
cvssv2.getAvailabilitycvssV2AvailabilityImpact
cvssv2.getConfidentialitycvssV2ConfidentialityImpact
cvssv2.getExploitabilitycvssV2Exploitability
cvssv2.getIntegritycvssV2IntegrityImpact
cvssv2.getRemediationLevelcvssV2RemediationLevel
cvssv2.getReportConfidenceccvssV2ReportConfidence
cvssv2.getSeveritycvssV2Severity
cvssv3.getAttackComplexitycvssV3AttackComplexity
cvssv3.getAttackVectorcvssV3AttackVector
cvssv3.getAvailabilitycvssV3AvailabilityImpact
cvssv3.getConfidentialitycvssV3ConfidentialityImpact
cvssv3.getExploitabilitycvssV3ExploitCodeMaturity
cvssv3.getIntegritycvssV3IntegrityImpact
cvssv3.getPrivilegesRequiredcvssV3PrivilegesRequired
cvssv3.getRemediationLevelcvssV3RemediationLevel
cvssv3.getReportConfidencecvssV3ReportConfidence
cvssv3.getSeveritycvssV3Severity
cvssv3.getUserInteractioncvssV3Ui
cvescveIds, cveRecords
date_addedsourceCreatedDate
date_modifiedsourceLastModified
date_publishedpublishedDate
denial_of_serviceLocal variable
descriptiondescription
exploitsexploits
exploit_skill_levelLocal variable
malwareKitsmalware
malware_popularityLocal variable
pci_severityLocal variable
pci_statusLocal variable
recommendationrecommendation
risk_scoreLocal variable
score.getBaseScorecvssV2BaseScore, cvssV3BaseScore
severitysourceSeverity, severity
titlename, summary
urlsreferences
uiduid
vulnerability_idLocal variable
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Changelog

The Rapid7 Nexpose Data Warehouse connector has undergone the following changes:

Table 5: Rapid7 Nexpose Data Warehouse connector changelog

VersionDescription
3.3.3No change.
3.0.16Changed the VULNERABILITY_ID attribute type on the Vulnerability Definition object from string to integer.
3.0.15Changed the ASSESSED_FOR_VULNERABILITIES attribute type on the Host object from string to boolean.
3.0.14Fixed an issue where the CREDENTIAL_STATUS attribute on the Host object was incorrectly set to the boolean type.
3.0.12Fixed an issue where the connector was not pulling in data.
3.0.11Updated to fetch azure_vmid as the Instance ID for Azure assets.
3.0.10Added a 'fixed' status if the remediation_date is set in the source.
3.0.9Added a CATEGORIES attribute in the Vulnerability object to store information about the vulnerability type.
3.0.8Enhanced to normalize hostnames retrieved from Rapid7 Nexpose Data Warehouse.
3.0.7Segregated local process files to avoid conflicts between multiple syncs.
3.0.0Initial Integration+ release.