ServiceNow alerts
Table of Contents
Self.Hosted 22.06 (EoL)
Expand all | Collapse all
-
- Getting started
- System Requirements
- Prisma Cloud container images
- Onebox
- Kubernetes
- OpenShift v4
- Console on Fargate
- Amazon ECS
- Alibaba Cloud Container Service for Kubernetes (ACK)
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- Google Kubernetes Engine (GKE)
- Google Kubernetes Engine (GKE) Autopilot
- IBM Kubernetes Service (IKS)
- Windows
- Defender types
- Cluster Context
-
- Install a single Container Defender
- Automatically Install Container Defender in a Cluster
- App-Embedded Defender
- App-Embedded Defender for Fargate
- Default setting for App-Embedded Defender file system protection
- VMware Tanzu Application Service (TAS) Defender
- Serverless Defender
- Serverless Defender as a Lambda layer
- Auto-defend serverless functions
- Install a single Host Defender
- Auto-defend hosts
- Deploy Prisma Cloud Defender from the GCP Marketplace
- Decommission Defenders
- Redeploy Defenders
- Uninstall Defenders
-
- Rule ordering and pattern matching
- Backup and restore
- Custom feeds
- Configuring Prisma Cloud proxy settings
- Prisma Cloud Compute certificates
- Configure Agentless Scanning
- Agentless Scanning Modes
- Configure scanning
- User certificate validity period
- Enable HTTP access to Console
- Set different paths for Defender and Console (with DaemonSets)
- Authenticate to Console with certificates
- Configure custom certs from a predefined directory
- Customize terminal output
- Collections
- Tags
- Logon settings
- Reconfigure Prisma Cloud
- Subject Alternative Names
- WildFire Settings
- Log Scrubbing
- Clustered-DB
- Permissions by feature
-
- Logging into Prisma Cloud
- Integrating with an IdP
- Integrate with Active Directory
- Integrate with OpenLDAP
- Integrate Prisma Cloud with Open ID Connect
- Integrate with Okta via SAML 2.0 federation
- Integrate Google G Suite via SAML 2.0 federation
- Integrate with Azure Active Directory via SAML 2.0 federation
- Integrate with PingFederate via SAML 2.0 federation
- Integrate with Windows Server 2016 & 2012r2 Active Directory Federation Services (ADFS) via SAML 2.0 federation
- Integrate Prisma Cloud with GitHub
- Integrate Prisma Cloud with OpenShift
- Non-default UPN suffixes
- Compute user roles
- Assign roles
- Credentials store
- Cloud accounts
-
- Prisma Cloud vulnerability feed
- Vulnerability Explorer
- Vulnerability management rules
- Search CVEs
- Scan reports
- Scanning procedure
- Customize image scanning
- Configure Registry Scans
-
- Scan Images in Sonatype Nexus Registry
- Scan images in Alibaba Cloud Container Registry
- Scan images in Amazon EC2 Container Registry (ECR)
- Scan images in Azure Container Registry (ACR)
- Scan images in Docker Registry v2 (including Docker Hub)
- Scan images in Google Artifact Registry
- Scan images in Google Container Registry (GCR)
- Scan images in Harbor Registry
- Scan images in IBM Cloud Container Registry
- Scan images in Artifactory Docker Registry
- Scan images in OpenShift integrated Docker registry
- Trigger registry scans with Webhooks
- Base images
- Configure VM image scanning
- Configure code repository scanning
- Agentless scanning
- Malware scanning
- Vulnerability risk tree
- Vulnerabilities Detection
- CVSS scoring
- Windows container image scanning
- Serverless function scanning
- VMware Tanzu blobstore scanning
- Scan App-Embedded workloads
- Troubleshoot vulnerability detection
-
- Compliance Explorer
- Enforce compliance checks
- CIS Benchmarks
- Prisma Cloud Labs compliance checks
- Serverless functions compliance checks
- Windows compliance checks
- DISA STIG compliance checks
- Custom compliance checks
- Trusted images
- Host scanning
- VM image scanning
- App-Embedded scanning
- Detect secrets
- Cloud discovery
- OSS license management
- API
End-of-Life (EoL)
ServiceNow alerts
ServiceNow is a workflow management platform.
It offers a number of security operations applications.
You can configure Prisma Cloud to route alerts to ServiceNow’s Security Incident Response application.
Prisma Cloud audits are mapped to a ServiceNow security incident as follows:
- Audits and incidents are mapped to individual ServiceNow security incidents.
- Vulnerabilities are aggregated by resource (currently image) and mapped to individual ServiceNow security incidents. ServiceNow short description field lists the resource. ServiceNow description field lists the details of each finding.
- Compliance issues are aggregated by resource (image/container/host) and mapped to individual ServiceNow security incidents. ServiceNow short description field lists the resource. ServiceNow description field lists the details of each finding.
Compliance alerts will be sent to ServiceNow in real time (right after compliance scan), unlike the other alert providers which send compliance alerts every 24 hours.
Compliance alerts will be sent if the resource is new, or if there’s a difference in the number of compliance issues for this resource after its scan. All the compliance issues of the resource will be sent (not only the new ones).
ServiceNow security incident | Field description | Prisma Cloud audit data |
---|---|---|
State | The current state of the security incident.
Upon security incident creation, this field defaults to Draft. | Draft (automatically set by ServiceNow) |
Priority | Select the order in which to address this security incident, based on the urgency. If this value is changed after the record is saved, it can affect the Business impact calculation. | Vulnerabilities: Max severity from the image’s new vulnerabilities.
ServiceNow’s priorities map one-to-one to Prisma Cloud severities (Critical - Critical, High - High, Medium - Medium, Low - Low). Compliance: Max severity from the image/container/host’s compliance issues.
ServiceNow’s priorities map one-to-one to Prisma Cloud severities (Critical - Critical, High - High, Medium - Medium, Low - Low). Incidents and audits: runtime audits priority set in the alert profile. |
Business impact | Select the importance of this security incident to your business. The default value is Non-critical. If, after the security incident record has been saved, you change the value in the Priority and/or Risk fields, the Business impact is recalculated. | Automatically calculated by ServiceNow |
Assignment group | The group to which this security incident is assigned. | Assignment group set in the alert profile |
Assigned to | The individual assigned to analyze this security incident. | Assignee set in the alert profile |
Short description | A brief description of the security incident. | Vulnerabilities:
Prisma Cloud Compute vulnerabilities for image <image name> Compliance:
Prisma Cloud Compute compliance issues for image/container/host <image/container/host name> Incidents and audits:
Prisma Cloud Compute Audit - <audit type> - <message> |
Category | Set to "None" | |
Sub-category | Set to "None" | |
Description | Description | Vulnerabilities:
Compliance:
Incidents and audits:
Note that the Project field will specify Central Console even when projects aren’t enabled.Note that the Collections field will exist only for the following runtime audits: Admission Audits, Docker Audits, App Embedded Audits, Host Activities, Host Log Inspection, WAAS audits, Incidents, Defender Disconnected. |
Configuring alert frequency
You can configure the rate at which alerts are emitted.
This is a global setting that controls the spamminess of the alert service.
Alerts received during the specified period are aggregated into a single alert.
For each alert profile, an alert is sent as soon as the first matching event is received.
All subsequent alerts are sent once per period.
- Open Console, and go toManage > Alerts.
- InAggregate audits every, specify the maximum rate that alerts should be sent.You can specifySecond,Minute,Hour,Day.
Sending findings to ServiceNow
Alert profiles specify which events trigger the alert machinery, and to which channel alerts are sent.
You can send alerts to any combination of channels by creating multiple alert profiles.
Alert profiles consist of two parts:
(1) Alert settings — Who should get the alerts, and on what channel?
Configure Prisma Cloud to integrate with ServiceNow and specify the people or places where alerts should be sent.
You can specify assignees and assignment groups.(2) Alert triggers — Which events should trigger an alert to be sent?
Specify which of the rules that make up your overall policy should trigger alerts.
Create new alert profile
Create a new alert profile.
- InManage > Alerts, clickAdd profile.
- Enter a name for your alert profile.
- InProvider, selectServiceNow.
Configure the channel
Configure Prisma Cloud to send alerts to ServiceNow, then validate the setup by sending a test alert.
Prerequisites:
You’ve created a service account in ServiceNow with a base role of web_service_admin.- InApplication, selectSecurity Incident Response.
- InURL, specify the base URL of your ServiceNow tenant.For example, https://ena03291.service-now.com
- InCredential, clickAdd New.
- InType, selectBasic authentication.This is currently the only auth method supported.
- Enter a username and password.
- (Optional) InAssignee, enter the name of a user in ServiceNow that will be assigned the security incident.This value isn’t case sensitive.
- (Mandatory) InAssignment Group, enter the name of a group in ServiceNow that will be assigned the security incident. The default value isSecurity Incident Assignment.IfAssignment Groupis set without speciyingAssignee, the first user from the group is set on the security incident (ServiceNow’s logic).If theAssigneeset in the profile isn’t a part of theAssignment Group, the security incident won’t be created (ServiceNow’s logic).
- (Optional) InCA certificate, enter a CA certificate in PEM format. Relevant only for on-premises deployments of ServiceNow.
- ClickSend Test Alert. If everything looks good, and you get an alert in ServiceNow, save the profile.
Configure the triggers
Configure how the alert is triggered.
- UnderAlert Types, check the boxes types of events that should trigger an alert.
- For additional configuration options, clickEdit.
- To specify specific rules that should trigger an alert, deselectAll rules, and then select any individual rules.
- ClickSave.