Cysiv Command

Cysiv Command is a modern security operations and analytics platform. It is the foundation for Cysiv’s threat monitoring, detection, hunting, investigation, and remediation service features. It combines several essential technologies and functions into a single platform, leveraging a broad range of advanced data science techniques to automate the time-consuming, complex but essential activities and processes for truly effective threat detection, hunting, investigation, and remediation.

Cysiv Command integrates with the Archer IT & Security Risk Management solution, specifically the Archer Cyber Security & Breach Response use case. Cysiv Command integrates with Archer Security Incidents and Incident Journal applications. This integration provides an ongoing management of incidents and security posture using Archer, while allowing a MSSP (Cysiv) to provide SOC-as-a-Service and SIEM-as-a-Service.


Release history

Last updated: February 2020

Overview of Cysiv Command

Key features and benefits

The Cysiv Command integration with Archer provides the following feature and benefits:

  • Potential security incidents in Cysiv Command (co-managed SIEM with the end customers) are mirrored to Archer as a means of both informing and interacting with the customer on security investigations.

  • Case details and case comments are mirrored bi-directionally to enable the Cysiv SOC team to use Cysiv Command while customers use Archer. This allows customers of the MSSP services Cysiv provides to track metrics and cases in the Archer tool set, which is important as the customer may have other incidents, cases or GRC activities that are not tracked by Cysiv. Archer acts as the overall security health and performance system for the customer.

Requirements

Components

Requirement

Archer Solution

Archer IT & Security Risk Management

Archer Use Case

Archer Cyber Incident and Breach Response

Archer Applications

Security Incidents, Incident Journal

Requires On-Demand License

No

Prerequisites (system requirements)

Components

Recommended Software

Operating System

Windows Server 2012 R2 or 2016

Standard or Datacenter editions

Database Server

Microsoft SQL Server 2016 SP 1 (64-bit) or greater

Note: SQL Express is not supported

Services Server

Java Runtime Environment (JRE) 8 (64-bit)

Archer

Archer 6.6 and later

Pre-Requisite Applications

N/A

Integration diagram

The following diagram shows the data flow between Cysiv Command and Archer.

As shown in the diagram there are five main use cases that result in data flow between Cysiv Command and Archer. After a Cysiv user successfully enables the Archer integration in Cysiv Command by retrieving a session token, the user can perform the following actions:

  1. Create a new Archer security incident from a Cysiv Command case, which populates fields in the Archer security incident application such as title, incident summary, incident details, and priority. This operation also includes posting a new incident journal entry to the security incident that includes additional information about the Cysiv Command case.

  1. Link a Cysiv Command case to an existing Archer security incident. This operation includes posting a new incident journal entry with additional information about the Cysiv Command case as well as syncing Cysiv Command case comments with Archer incident journal entries. In addition, some key fields in the Archer security incident application, including the incident id, status, priority, and owner are retrieved and saved in Cysiv Command.

Once a Cysiv Command case is linked to an Archer security incident by performing one of the actions above, a Cysiv Command user can then do the following:

  1. Create a new incident journal entry in the linked Archer security incident.

  2. Retrieve new incident journal entries and security incident data from the linked Archer security incident.

  3. Resolve a Cysiv Command case that is linked to an Archer security incident, which will trigger Cysiv Command to create a new incident journal entry in Archer informing that the Command case has been closed and the reason for closing the case.

ConfigureCysiv Command and Archer integration

All Cysiv Command components must be installed and working prior to the integration. Perform the necessary tests to confirm that this is true before proceeding. 

Important: The integration described in this guide is being provided as a reference implementation for evaluation and testing purposes.  It may or may not meet the needs and use cases for your organization.  If additional customizations or enhancements are needed, it is recommended that customers contact Archer Help for assistance.

Configure Cysiv Command

Add Archer App integration

Note: Only privileged Cysiv Command users that have the necessary permissions can perform these steps.

  1. Log into Cysiv Command

  2. Navigate to Administration > App Integrations

  3. Click the “Connect” button in the Archer row

  4. Fill in the fields, which include:

    • Instance name

    • Username

    • Password

    • User Domain (optional)

    • Archer Hostname

    • Archer Port Number

    • Archer URL Path

  5. Click the “Connect” to add the integration.

    Note: Archer Hostname, Port Number, and URL Path fields can be retrieved from the URL that is used to access Archer. For example, if the URL that is used to access Archer is https://my.archer.host.com/archer, the hostname, port number, and URL path would be “my.archer.host.com”, 443 (since https is used), and Archer, respectively.

  6. If connecting to Archer is successful, the “Connect” button next to the Archer row will be greyed out in the App Integrations page.

Configure Archer

Note: The two tasks below are optional. If the custom fields are not present in the application, they will not be populated by Cysiv Command.

Optional: Set the following fields to Private access Everyone. This lets everyone have read access to the fields but without modify capabilities.

Task 1: Add custom fields to the security incident application

  1. Add Cysiv_ID field of type numeric

  2. Add Target_Asset field of type text

  3. Add Created_By field of type text

  4. Add DateTime_Closed field of type text

  5. Add Closed_By field of type text

  6. Add Closed_Reason field of type text

  7. Add Reason_Closed_Notes field of type text

Task 2: Add custom field to the security incident application’s source values list

  1. Add Cysiv as a new source

Certification environment

Date tested: January 2020

Product Name

Version Information

Operating System

Archer

6.6

Windows Server 2016 Standard

Cysiv Command

N/A

N/A