As of March 2021, this feature is available even on the Standard plan on a trial basis.
By integrating with Trend Micro Cloud One Workload Security (hereafter referred to as CloudOne), FutureVuls can add the following two functions:
Intrusion prevention rule optimization function
Automatically generate intrusion prevention policies in CloudOne based on the list of CVE-IDs detected in FutureVuls.
Since the rules are automatically generated based on the CVE-IDs actually detected, optimized rules can be generated. Policies will be created in CloudOne in the form of [Vuls] {Server Role Name}
. Please divide the server roles into units to be managed as the same policy in CloudOne. (See how to create roles)
Intrusion prevention rule display and automatic triage function Display the CVE-IDs being defended in CloudOne on the list screen and set the status of the corresponding task to WorkAround. After installing CloudOne’s agent, it is necessary to rescan in FutureVuls.
Both functions are executed at the time of scanning by FutureVuls.
With the 2021/6/18 release, if a Cloud One intrusion prevention rule corresponding to the vulnerability detected by FutureVuls exists, an icon with an Available
status will be displayed.
The Available status is displayed by default even if “Group settings>Cloud One external cooperation” is not set. The information on whether or not there is an intrusion prevention rule is synchronized every few hours on the FutureVuls service side.
This is a useful function when you detect a high-risk vulnerability but cannot update it immediately, and want to check if an intrusion prevention rule for the vulnerability exists in CloudOne as a temporary workaround.
You can configure it from the External integration
in the group setting.
Enter the API token
created earlier and click the “Save” button.
At this time, you can also set whether to automatically generate policies and set triage.
Create roles in units that you want to divide.
Creating roles in units of CloudOne policies makes it easier to manage.
When creating policies, create a policy name with the naming convention [Vuls] {role name}
, and the intrusion defense rule will be automatically updated.
For example, if the name of the role is default
, create a policy name of [Vuls] default
on CloudOne.
※ If the policy name does not exist, a new policy will be created using the above naming convention.
For new creations, set “Perform continuous search for recommended settings” to “Yes” or “No” in “Settings > General > Recommended Settings” of the policy. If neither is selected, the intrusion defense will fail to reflect. (If “Inheritance (Yes/No)” or “Initial Settings (Yes/No)” is selected, the process will fail) Also, if you turn on the intrusion defense, the set rules will be enabled.
On the server page, you can change the roles of multiple servers at once by selecting them.
To integrate with CloudOne, you need to perform a scan again Until the integration with CloudOne is completed, it may take a few minutes.
In the server list screen, the mark indicating that intrusion prevention rules are enabled will be displayed in the “CloudOne status”.
In the task list screen, if the intrusion prevention rules set in CloudOne are reflected, the status will be reflected in the “CloudOne status” column. Also, depending on the situation, the task status will also be changed.
Policy settings are created for each role, so appropriate server role management is necessary to enhance the effectiveness of integration.