Skip to main content

Trend Micro Cloud Conformity

Trend Micro Cloud Conformity is a cloud security tool that scans your cloud assets for policy violations. You can bring access control roles, accounts, checks, events, groups, reports, services, and users from Trend Micro into the Brinqa Platform to construct a unified view of your attack, thus strengthening your cybersecurity posture.

This document details the information you must provide for the connector to authenticate with Trend Micro Cloud Conformity and how to obtain that information from Trend Micro. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select Trend Micro Cloud Conformity from the Connector drop-down. You must provide the following information to authenticate Trend Micro Cloud Conformity with Brinqa:

  • Server URL: Your organization's Trend Micro Cloud Conformity Server URL. The default URL format is https://<ServerName>/.

  • API key: The API token associated with the Trend Micro Cloud Conformity account, which must have permissions to log in to the API server and return data.

Generate a Trend Micro Cloud Conformity API key

For the Trend Micro Cloud Conformity connector to retrieve data from the Cloud Conformity API, you must provide an API key. To obtain an API key, follow these steps:

  1. Log in to your organization's Trend Micro Cloud One portal.

  2. Click the drop-down at the top of the page and select Administration.

    Trend Micro Cloud Conformity administration

  3. Navigate to API Keys, and then click New.

    The "New API Key" dialog appears. Complete the following:

    • API Key Alias: Provide an alias, or title, for the API key.

    • Description: (Optional) Provide a description for the API key.

    • Role: Click the drop-down and select Read Only, as this is considered to be the minimum role needed to read and retrieve data from the Cloud Conformity API. For additional information, see Trend Micro Cloud One documentation.

    • Language: Click the drop-down and select language for the API key.

    • CIDR Ranges and IP Addresses: (Optional) Specify the CIDR range(s) and/or specific IP address(es) from which API requests are allowed. You can add multiple ranges or addresses by pressing "Enter" on your keyboard or separating them with commas. Both IPv4 and IPv6 addresses are supported.

      You can leave these fields blank to allow any CIDR range or IP address to access the API. Please contact your Brinqa Support team so that they can assist you with the list of CIDR ranges or IP addresses for whitelisting.

    • Timezone: Click the drop-down and specify the timezone for the API key.

      Trend Micro Cloud Conformity API key dialog

  4. Click Next.

    Your API key displays. You cannot view the key again after this. Copy and save it to a secure location.

note

If you do not have permissions to create an API key, contact your Trend Micro Cloud Conformity administrator. For additional information, see Trend Micro Cloud One documentation.

Additional settings

The Trend Micro Cloud Conformity connector contains additional options for specific configuration:

  • Parallel requests: The maximum number of parallel API requests. The default setting is 4.

  • Page size: The maximum number of records to get per API request. The default setting is 100. It is not recommended to go over 100.

Types of data to retrieve

The Trend Micro Cloud Conformity connector can retrieve the following types of data from the Cloud Conformity API:

Table 1: Data retrieved from Trend Micro Cloud Conformity

Connector ObjectRequiredMaps to Data Model
Access Controls RoleNoNot mapped
AccountYesCloud Resource
CheckYesCloud Resource,
Violation,
Violation Definition
EventNoIncident
GroupNoTeam
ReportNoNot mapped
ServiceNoNot mapped
UserYesPerson
info

The Trend Micro Cloud Conformity connector does not currently support operation options for the types of data it retrieves.

For detailed steps on how to view the data retrieved from Trend Micro Cloud Conformity in the Brinqa Platform, see How to view your data.

Attribute mappings

Expand the sections below to view the mappings between the source and the Brinqa data model attributes.

Account

Table 2: Account attribute mappings

Source Field NameMaps to Attribute
accessLocal variable
accessLevelLocal variable
authFailureCountLocal variable
awsaccount-idcloudAccountId
bot-statusLocal variable
cloud-idLocal variable
cloud-typecloudProvider
consumption-tierLocal variable
created-datesourceCreatedDate
disabledLocal variable
disabledUntilLocal variable
environmentLocal variable
firstAuthErrorDateLocal variable
iduid
is-deprecated-rules-freeLocal variable
last-checked-datesourceLastModified
last-monitoring-event-dateLocal variable
namename
resources-countLocal variable
security-packageLocal variable
statusstatus, statusCategory, sourceStatus
tagstags
typetype
Check

Table 3: Check attribute mappings

Source Field NameMaps To UDMMaps to Attribute
categoriesNot mappedcategories
ccrnCloud Resourceuid, Local variable
cloudAccountIdCloud Resourcelocal variable, cloudAccountId
compliancesNot mappedlocal variable
costNot mappedlocal variable
created-dateViolationsourceCreatedDate
descriptorTypeNot mappedlocal variable
excludedNot mappedlocal variable
extradata.labelNot mappedlocal variable
extradata.nameNot mappedlocal variable
extradata.typeNot mappedlocal variable
extradata.valueNot mappedlocal variable
failure-discovery-dateNot mappedlocal variable
failureCountNot mappedLocal variable
idViolationuid
last-modified-dateViolationsourceLastModified
last-refresh-dateNot mappedlocal variable
linkCloud Resourceurl, local variable
link-titleNot mappedlocal variable
messageNot mappedlocal variable
pretty-risk-levelNot mappedlocal variable
providerCloud Resourcecloud provider, local variable
regionViolation,
CloudResource
region
relationships.account.data.idViolationtargets
relationships.account.data.typeNot mappedlocal variable
relationships.rule.data.idNot mappedtype
relationships.rule.data.typeNot mappedlocal variable
resolution-page-urlNot mappedlocal variable
resourceNot mappedlocal variable
resourceNameNot mappedlocal variable
risk-levelNot mappedlocal variable
rule-titleNot mappedlocal variable
rules.accountIdsNot mappedLocal variable
rules.categoriesViolation Definitioncategories
rules.providerNot mappedlocal variable
rules.riskLevelsViolation Definitionseverity, sourceSeverity, severityCategory
rules.ruleIdViolation Definitionuid
rules.ruleTitleViolation Definitionname
rules.servicesNot mappedlocal variable
serviceViolationtargets
statusViolationstatus, statusCategory, sourceStatus
status_reasonNot mappedlocal variable
suppressedCountNot mappedLocal variable
suppressedFailureCountNot mappedLocal variable
suppressedSuccessCountNot mappedLocal variable
tagsViolationtags
typeNot mappedlocal variable
wasteNot mappedlocal variable
Event

Table 4: Event attribute mappings

Source Field NameMaps to Attribute
descriptiondescription
iduid
namename
relationships.account.data.idLocal variable
relationships.account.data.typeLocal variable
relationships.organization.data.idLocal variable
relationships.organization.data.typeLocal variable
relationships.user.data.idLocal variable
relationships.user.data.typeLocal variable
timesourceCreatedDate
typetype
Group

Table 5: Group attribute mappings

Source Field NameMaps to Attribute
accounts.data.idLocal variable
accounts.data.typeLocal variable
created-datesourceCreatedDate
iduid
last-modified-datesourceLastModified
namename
relationships.organization.data.idLocal variable
relationships.organization.data.typeLocal variable
tagstags
typetype
User

Table 6: User attribute mappings

Source Field NameMaps to Attribute
created-datesourceCreatedDate
emailemail
email-organization-idLocal variable
first-namefirstName
has-credentialsLocal variable
iduid
is-cloud-one-ssov2-userLocal variable
is-cloud-one-userLocal variable
last-login-datelastSeen
last-namelastName
roleLocal variable
statusstatus
summary-email-opt-outLocal variable
typetype
note

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

APIs

The Trend Micro Cloud Conformity connector uses the Cloud Conformity API. Specifically, it uses the following endpoints:

Table 7: Trend Micro Cloud Conformity API Endpoints

Connector ObjectAPI Endpoints
Access Controls RoleGET /access-control/roles
AccountGET /accounts
CheckGET /checks
EventGET /events
GroupGET /groups
ReportGET /reports
ServiceGET /services
UserGET /users

Changelog

The Trend Micro Cloud Conformity connector has undergone the following changes:

3.0.1.2