Skip to main content

WhiteHat Sentinel

WhiteHat Sentinel by Synopsys is an application security tool that identifies vulnerabilities across your web applications. You can bring attack vector, dynamic code, and site data from WhiteHat Sentinel into Brinqa to centralize your applications attack surface, thus strengthening your cybersecurity posture.

This document details the information you must provide for the connector to authenticate with WhiteHat Sentinel and how to obtain that information from WhiteHat Sentinel. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select WhiteHat Sentinel from the Connector drop-down list. You must provide the following information to authenticate WhiteHat Sentinel with Brinqa:

  • Service URL: The WhiteHat Sentinel service URL. The default URL is https://sentinel.whitehatsec.com.

  • API Key: The access key associated with the WhiteHat Sentinel account, which must have permissions to log in to the API server and return data.

Generate a WhiteHat Sentinel API key

For the WhiteHat Sentinel connector to access the WhiteHat Sentinel API, you must provide an API key. You can access an existing API key or generate a new one. To obtain an API key, follow these steps:

  1. Log in to your organization's WhiteHat Sentinel account.

  2. Click My Profile and then the API Key tab.

  3. Type your password in the Verify password field and click Authenticate.

    The API key displays. If this is your first time requesting an API key, a new key is generated. Click Regenerate API key if you want to replace your existing key.

note

If you do not have the permissions to create an API key, contact your WhiteHat Sentinel administrator. For additional information, see WhiteHat Sentinel documentation.

Additional settings

The WhiteHat Sentinel connector contains additional options for specific configuration:

  • Page size: The maximum number of records to get per API request. The default setting is 100. It is not recommended to go over 100.

  • Parallel requests: The maximum number of parallel API requests. The default setting is 4.

Types of data to retrieve

The WhiteHat Sentinel connector can retrieve the following types of data from the WhiteHat Sentinel API:

Table 1: Data retrieved from WhiteHat Sentinel

Connector ObjectRequiredMaps to Data Model
ApplicationYesApplication
Attack VectorNoNot mapped
Dynamic Code FindingYesDynamic Code Finding
Dynamic Code Finding DefinitionYesDynamic Code Finding Definition
IssueYesStatic Code Finding
SiteYesSite
info

For detailed steps on how to view the data retrieved from WhiteHat Sentinel in the Brinqa Platform, see How to view your data.

Attribute mappings

Expand the sections below to view the mappings between the source and the Brinqa data model attributes.

Application

Table 2: Application attribute mappings

Source Field NameMaps to Attribute
CLIENT_RATING_METHODLocal variable
DATE_CREATEDsourceCreatedDate
INDUSTRYLocal variable
LAST_SCANNEDlastScanned
LANGUAGElanguages
NAMEname
ORGLocal variable
OWNERLocal variable
PACKAGE_NAMELocal variable
PHASELocal variable
PLATFORMLocal variable
PRE_SCAN_STATUSLocal variable
SCAN_STATUSLocal variable
SELocal variable
STATUSstatus
SUB_IDLocal variable
SYS_IDuid
TAGStags
TYPEcategory, assetType
Dynamic Code Finding

Table 3: Dynamic Code Finding attribute mappings

Source Field NameMaps to Attribute
acceptedLocal variable
categorycategories
cvssBaseScoreUse CVSS calculator
cvssBaseVectorUse CVSS calculator
cvssEnvScoreUse CVSS calculator
cvssEnvVectorUse CVSS calculator
customRiskLocal variable
definitionIDtype
directRemediationAvailablepatchAvailable
firstFoundfirstFound
impactLocal variable
isAccessibleLocal variable
lastClosedlastFixed
lastFoundlastFound
lastModifiedsourceLastModified
lastRetestedLocal variable
likelihoodLocal variable
manualLocal variable
outOfScoreReasonsLocal variable
requestrequest
reasonLocal variable
responseresponse
retestStatusstatus
riskLocal variable
severityseverity, severityScore
siteIDtargets, Local variable
siteNameLocal variable
statusstatus, statusCategory
subIDLocal variable
tagstags
threatLocal variable
unreachableLocal variable
urlurl
verificationStatusstatus
sysIDuid
Dynamic Code Finding Definition

Table 4: Dynamic Code Finding Definition attribute mappings

Source Field NameMaps to Attribute
cvssV3ScorecvssV3BaseScore
cvssV3VectorcvssV3Vector
descriptiondescription
namename
retiredLocal variable
riskLocal variable
solutionrecommendation
sysIDuid
titleLocal variable
Issue

Table 5: Issue attribute mappings

Source Field NameMaps to Attribute
APP_IDtargets
CATEGORYcategories
CUSTOM_RISKLocal variable
CVEcveIds, cveRecords
CVSS_BASE_SCOREcalculator
CVSS_BASE_VECTORcalculator
CVSS_ENV_SCOREcalculator
CVSS_ENV_VECTORcalculator
DAST_CLASSESLocal variable
DEFINITION_IDtype, Local variable
DESCRIPTIONdescription
FILE_NAMEname
FIRST_FOUNDfirstFound
IMPACTLocal variable
LAST_FOUNDlastFound
LAST_MODIFIEDsourceLastModified
LIKELIHOODLocal variable
RISKLocal variable
SCORELocal variable
SOLUTIONLocal variable
STATUSstatus
SYS_IDuid
TAGStags
THREATLocal variable
Site

Table 6: Site attribute mappings

Source Field NameMaps to Attribute
applianceIDLocal variable
associatedHostnameLocal variable
categoriescategories
clientIDLocal variable
hostnamehostname
industryLocal variable
namename
notesLocal variable
organizationLocal variable
speedLocal variable
statusstatus
sysIDuid
usesSatelliteLocal variable
weightLocal variable
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models (UDM). They only exist on the source data model (SDM).

Use CVSS calculator indicates that the CVSS (Common Vulnerability Scoring System) vectors and scores aren't directly mapped to a specific attribute on the UDM. Instead, a specialized library calculates the CVSS scores from the provided CVSS vector strings.

Operation options

The WhiteHat Sentinel connector supports the following operation options. See connector operation options for information about how to apply them.

Table 7: WhiteHat Sentinel connector operation options

Connector ObjectOptionAll Possible ValuesDescriptionExample
Attack Vectorstatusaccepted, certified, closed, openA comma-separated list of attack vector statuses. Retrieve attack vector information based on the specific status as determined by WhiteHat Sentinel.Key: status Value: accepted. This key and value combination only retrieves attack vector information with a status of accepted.
Dynamic Code Findingstatusaccepted, closed, invalid, mitigated, out_of_scopeA comma-separated list of finding statuses. Retrieve findings based on the specified status as determined by WhiteHat Sentinel.Key: status Value: mitigated,accepted. This key and value combination only retrieves findings with a status of accepted or mitigated.
Issuestatusclosed, discovered, false, openA comma-separated list of issue statuses. Retrieve issue information based on the specific status as determined by WhiteHat Sentinel.Key: status Value: open,discovered. This key and value combination only retrieves issues with a status of open or discovered.
note

The option keys and values are case-sensitive as they are shown in this documentation.

APIs

The WhiteHat Sentinel connector uses the WhiteHat Sentinel API v1 and v2. Specifically, it uses the following endpoints:

Table 8: WhiteHat Sentinel API Endpoints

Connector ObjectAPI Endpoint
ApplicationGET /api/assets
Attack VectorGET /api/findings
GET /api/vuln/{findingId}/attack_vector
Dynamic Code FindingGET /api/findings
GET /api/vuln/{findingId}/attack_vector
Dynamic Code Finding DefinitionGET /api/vulnerabilityClasses
IssueGET /api/source_vuln
GET /api/vulnerabilityClasses
SiteGET /api/v2/sites

Changelog

The WhiteHat Sentinel connector has undergone the following changes:

Table 9: WhiteHat Sentinel connector changelog

VersionDescription
3.0.3No change.
3.0.2- Changed the MANUAL attribute type on the Dynamic Code Finding object from string to boolean.
- Changed the SOURCE_SEVERITY attribute type on the Dynamic Code Finding object from string to integer.
3.0.1No change.
3.0.0Initial Integration+ release.