This article shows how to leverage the Lumu Defender API and Cisco Secure Access API to mitigate security risks by leveraging the Cisco Secure Access Destination List feature.
Ensure your script host can communicate with the following hosts. These are required for the operation of this integration.
Lumu Custom Response integration with Cisco Secure Access uses its API to manage a dedicated Destination List. The integration updates the Domains, IP and URL indicators of the list based on Lumu detections to avoid further outbound contacts within your Cisco Secure Access deployment.
To set up the integration, you must prepare your Cisco Secure Access instance to communicate with the Lumu integration, specifically you need to create a Custom API Key. The following sections will guide you on how to perform this task.
Log in to your Cisco Secure Access Web console with a user with administrative privileges and perform the following steps to create a new Custom API Key.
1. Navigate to Admin > Management > API Keys. Then, Click Add (1), located in the upper right corner of the screen.
2. Give it a distinct name. Then, locate and select Destination List and Destinations within Key Scope / Policies, and subsequently assign Read/Write permissions to both. Set an Expiry Date following your organization’s security guidelines.
You must reissue the integration API key near the expiration date and update the integration configuration to keep your integration working.
3. Locate the API Key and the API Key Secret at the bottom of the screen. Copy and save these credentials, they will be used during the Set up the configuration parameters step.
The integration set-up process needs you to collect this information from Lumu portal:
Log in to your Lumu Portal and run the following procedures to collect this data.
To collect the Lumu Defender API key, please refer to the Defender API document.
To collect your Lumu company UUID, log in to your Lumu portal. Once you are in the main window, copy the string below your company name.
Before starting, ensure your integration environment can communicate with the hosts listed in the Contacted Hosts section.
The integration is deployed in a Docker environment by using the Makefile model (Unix-based systems). Adhere to the subsequent guidance to prepare the hosting environment.
First, you must unpack the integration package shared by our Support team. Unpack the deployment package provided by Lumu in your preferred path/folder. Keep in mind this location, as it will be required for further configurations. From now on, we will refer to this folder as <app_lumu_root>.
You must follow the Docker installation documentation that corresponds to your OS. Ensure you follow the Post-installation steps for Linux before deploying the integration.
Execute the following command and input all parameters gathered during the Preliminary Setup - Lumu Portal and Preliminary Setup - Cisco Secure Access steps.
Each input is subject to format validation. Ensure that the inputs adhere to the required format. Incorrect formatting will prevent the wizard from advancing to the subsequent prompt.
Once you correctly enter the configuration parameters, a .config.toml file will be generated.
The integration should not be deployed until this setup process is complete to prevent underlying errors.
You must fill in the configuration data carefully. If there are any mistakes or missing data, you’ll receive errors during the deployment and run time of the integration.
To streamline the deployment process, Lumu introduced the Makefile model integration that allows you to easily deploy integrations as a Docker container. To deploy the integration, locate yourself in the <app_lumu_root> folder, and run the following command:
Monitor the console output for any unexpected errors. If there are any errors present, fix them and run the command again. Check the Troubleshooting section for further reference.
Once you have successfully integrated Cisco Secure Access, any Indicators of Compromise (IoC) present in your instance will be visible within the Destination List created specifically for this integration.
Proceed to Resources > Destinations > Internet and SaaS Resources, then select the Destination List Tab. Then, locate and expand the relevant destination list to view the ingested indicators.
Once the Destination List is populated and synchronized by the integration, it can be applied to specific access policies. Navigate to Secure > Access Policy. Then, select the desired rule and edit it to associate the Destination list populated by the integration.
This is how it looks like a blocking web page listed in the Destination List.
The commands defined in this section will allow you to troubleshoot the operation of your integration. Keep in mind that you must locate yourself in the <app_lumu_root> folder before running any of them.
The following are the troubleshooting commands for this deployment option:
support.tar package file that contains relevant information for the Lumu support team.
In this section we collect all the potential issues you will find after you run the troubleshooting commands from the above section.
Most of the issues building the component are due to network issues like not a proper Docker Network connection or temporarily unavailable repositories, just make sure your Docker has an active DNS resolution and a good internet outgoing. You might receive errors like failed download, reset connection.
If you got some error building the integration related to docker: permission denied while trying to connect to the Docker daemon socket, run the make docker-fix-sudo command.
If you receive errors like this:
It means you are using the wrong key parameters or values. Review your configuration files and run the integration again.
You will get the following log, when the component is operational, an error such as 401 Unauthorized may be observed.
You may encounter issues associated with general network connection failures. Make sure you have a stable Internet connection and try again.
An error of this nature often indicates that while the credentials may be valid, the associated permissions are likely misconfigured and getting forbidden 403 error. Please verify the assigned scopes.