AppOmni

About The Device

Protect and monitor the SaaS environment for your businesses. The SaaS Security Management platform that lets you Scan, Secure, and Monitor your SaaS applications like Box, Dropbox, Salesforce, etc. 

Device Information

 Entity

Particulars

 Entity

Particulars

Vendor Name

AppOmni

Product Name

AppOmni

Type of Device

Cloud

Collection Method

 Log Type

Ingestion label

Preferred Logging Protocol - Format

Log Collection Method

Data Source

 Log Type

Ingestion label

Preferred Logging Protocol - Format

Log Collection Method

Data Source

AppOmni

 APPOMNI

 Webhook - JSON

 C2C - Push

N/A

Device Configuration

AppOmni Integration with Webhook (Recommended)

  1. Log into your AppOmni console

  2. Navigate to Threat detection > Destinations

  3. Click Add Destination

image-20240823-092603.png
  1. search for Webhook and click on that.

  1. Click Continue.

  1. Fill below details and rest everything should have default value.

a. Name - Provide the name

b. Description (Optional) - Provide description

c. URL Endpoint - Contact with On-boarding engineer for this URL

d. HTTP Method - Select Post

e. Delivery Format - Select JSON Lines

  1. Click Save.

  2. Once the destination is created, check if it is enabled. If it is not enabled, enable it.

AppOmni Integration with AWS S3 (Alternative)

 Create S3 Bucket

  1. Go to https://s3.console.aws.amazon.com/

  2. Click Create Bucket

  3. Provide a name for the S3 bucket

  4. Select a Region

  5. Click Create Bucket

Create an IAM User

Create an IAM user with upload access to the bucket. Please reference the AWS documentation, Controlling access to a bucket with user policies, for instructions on performing this step.

Follow below document for IAM user permission: 

Retrieve access key and access key ID

  1. Login to AWS console with the user created in above step.

  2. In the AWS console, select your account name and, in the drop-down menu, select Security credentials

  1. In the Access keys panel, select Create access key. After creation, copy the keys from the Access key and Secret access key fields.

Configure destination as AWS S3 in AppOmni console

  1. Log into your AppOmni console

  2. Navigate to Threat detection > Destinations

  3. Click on Add Destination

  1. Search for Amazon Web Services and click on that

5.Click on Continue

  1. Fill below details and rest everything should be default.

a. Name - Mention the name

b. Description (Optional)- Mention the description

c. AWS region name - Provide the AWS S3 bucket region

d. AWS access key - Provide the Secret Access key which we have created in previous steps

e. AWS access key ID - Provide the Access Key which we have created in previous steps

f. AWS bucket name - Provide the S3 bucket name where you want to store the logs 

g. Delivery Format - Select JSON lines

  1. Click on Save

  1. Once the destination has created, check if it is enabled or not. If it is not enabled than enable it.

  2. Review the JSON files in the S3 bucket.

Create SQS and attach with S3:

Refer this document:

Follow below page for IAM user policies which are required for SQS & S3:

If SQS is encrypted, please add below policy in KMS. This policy is required to make s3 events notify SQS:

KMS Policy: *********** { "Sid": "example-statement-ID", "Effect": "Allow", "Principal": { "Service": "s3.amazonaws.com" }, "Action": [ "kms:GenerateDataKey", ], "Resource": "*" }

Integration Parameters

Parameters required from customer for Integration.

Property

Default Value

Description

Property

Default Value

Description

REGION

Custom Value

Select the region of your S3 bucket

QUEUE NAME

Custom Value

The SQS queue name.

ACCOUNT NUMBER

Custom Value

The account number for the SQS queue and S3 bucket.

QUEUE ACCESS KEY ID

Custom Value

This is the 20 character ID associated with your Amazon IAM account.

QUEUE SECRET ACCESS KEY

Custom Value

This is the 40 character access key associated with your Amazon IAM account.

SOURCE DELETION OPTION

Custom Value

Whether to delete source files after they have been transferred to Chronicle. This reduces storage costs. Valid values are:

  • SOURCE_DELETION_NEVER: Never delete files from the source.

  • SOURCE_DELETION_ON_SUCCESS:Delete files and empty directories from the source after successful ingestion.

  • SOURCE_DELETION_ON_SUCCESS_FILES_ONLY:Delete files from the source after successful ingestion.

About Accenture:
Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organizations build their digital core, optimize their operations, accelerate revenue growth and enhance citizen services—creating tangible value at speed and scale. We are a talent and innovation led company with 738,000 people serving clients in more than 120 countries. Technology is at the core of change today, and we are one of the world’s leaders in helping drive that change, with strong ecosystem relationships. We combine our strength in technology with unmatched industry experience, functional expertise and global delivery capability. We are uniquely able to deliver tangible outcomes because of our broad range of services, solutions and assets across Strategy & Consulting, Technology, Operations, Industry X and Accenture Song. These capabilities, together with our culture of shared success and commitment to creating 360° value, enable us to help our clients succeed and build trusted, lasting relationships. We measure our success by the 360° value we create for our clients, each other, our shareholders, partners and communities. Visit us at www.accenture.com.

About Accenture Security
Accenture Security is a leading provider of end-to-end cybersecurity services, including advanced cyber defense, applied cybersecurity solutions and managed security operations. We bring security innovation, coupled with global scale and a worldwide delivery capability through our network of Advanced Technology and Intelligent Operations centers. Helped by our team of highly skilled professionals, we enable clients to innovate safely, build cyber resilience and grow with confidence. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security.

Legal notice: Accenture, the Accenture logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Accenture and its subsidiaries in the United States and in foreign countries. All trademarks are properties of their respective owners. This document is intended for general informational purposes only and does not take into account the reader’s specific circumstances, and may not reflect the most current developments. Accenture disclaims, to the fullest extent permitted by applicable law, any and all liability for the accuracy and completeness of the information in this presentation and for any acts or omissions made based on such information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers are responsible for obtaining such advice from their own legal counsel or other licensed professionals.