ArmorCode
Port's ArmorCode integration allows you to model ArmorCode resources in your software catalog and ingest data into them.
Overviewโ
This integration allows you to:
- Track security vulnerabilities and findings from ArmorCode in Port.
- Map products, sub-products, and their security findings.
- Monitor security posture across your software catalog.
Supported Resourcesโ
The resources that can be ingested from ArmorCode into Port are listed below. It is possible to reference any field that appears in the API responses linked below in the mapping configuration.
Products
- ArmorCode products representing applications or services.Sub-Products
- Repositories or components within products.Findings
- Security vulnerabilities and issues detected by ArmorCode.
Setupโ
Choose one of the following installation methods:
- Hosted by Port
- Self-hosted
- CI
Using this installation option means that the integration will be hosted by Port, with a customizable resync interval to ingest data into Port.
Live event support
Currently, live events are not supported for this integration.
Resyncs will be performed periodically (with a configurable interval), or manually triggered by you via Port's UI.
Therefore, real-time events (including GitOps) will not be ingested into Port immediately.
Live events support for this integration is WIP and will be supported in the near future.
Alternatively, you can install the integration using the Self-hosted method to update Port in real time using webhooks.
Installation
To install, follow these steps:
-
Go to the Data sources page of your portal.
-
Click on the
+ Data source
button in the top-right corner. -
Click on the relevant integration in the list.
-
Under
Select your installation method
, chooseHosted by Port
. -
Configure the
integration settings
andapplication settings
as you wish (see below for details).
Application settings
Every integration hosted by Port has the following customizable application settings, which are configurable after installation:
-
Resync interval
: The frequency at which Port will ingest data from the integration. There are various options available, ranging from every 1 hour to once a day. If a sync is still in progress when the next one is due, the new sync will be skipped (up to 24 hours delay).
This ensures that all kinds are fully synchronized and that cleanup of stale entities always takes place at the end of each sync. -
Send raw data examples
: A boolean toggle (enabled
by default). If enabled, raw data examples will be sent from the integration to Port. These examples are used when testing your mapping configuration, they allow you to run yourjq
expressions against real data and see the results.
Integration settings
Every integration has its own tool-specific settings, under the Integration settings
section.
Each of these settings has an โ icon next to it, which you can hover over to see a description of the setting.
Port secrets
Some integration settings require sensitive pieces of data, such as tokens.
For these settings, Port secrets will be used, ensuring that your sensitive data is encrypted and secure.
When filling in such a setting, its value will be obscured (shown as โขโขโขโขโขโขโขโข
).
For each such setting, Port will automatically create a secret in your organization.
To see all secrets in your organization, follow these steps.
Limitations
- The maximum time for a full sync to run is based on the configured resync interval. For very large amounts of data where a resync operation is expected to take longer, please use a longer interval.
Port source IP addresses
When using this installation method, Port will make outbound calls to your 3rd-party applications from static IP addresses.
You may need to add these addresses to your allowlist, in order to allow Port to interact with the integrated service:
- Europe (EU)
- United States (US)
54.73.167.226
63.33.143.237
54.76.185.219
3.234.37.33
54.225.172.136
3.225.234.99
Using this installation option means that the integration will be able to update Port in real time using webhooks.
Prerequisites
To install the integration, you need a Kubernetes cluster that the integration's container chart will be deployed to.
Please make sure that you have kubectl
and helm
installed on your machine, and that your kubectl
CLI is connected to the Kubernetes cluster where you plan to install the integration.
If you are having trouble installing this integration, please refer to these troubleshooting steps.
For details about the available parameters for the installation, see the table below.
- Helm
- ArgoCD
To install the integration using Helm:
-
Go to the ArmorCode data source page in your portal.
-
Select the
Real-time and always on
method: -
A
helm
command will be displayed, with default values already filled out (e.g. your Port client ID, client secret, etc).
Copy the command, replace the placeholders with your values, then run it in your terminal to install the integration.
BaseUrl & webhook configuration
integration.config.appHost
is deprecated: Please use liveEvents.baseUrl
for webhook URL settings instead.
In order for the ArmorCode integration to update the data in Port on real-time changes in ArmorCode, you need to specify the liveEvents.baseUrl
parameter.
The liveEvents.baseUrl
parameter should be set to the url
of your ArmorCode integration instance. Your integration instance needs to have the option to setup webhooks via http requests/recieve http requests , so please configure your network accordingly.
To test webhooks or live event delivery to your local environment, expose your local pod or service to the internet using ngrok:
ngrok http http://localhost:8000
This will provide a public URL you can use for webhook configuration and external callbacks during development.
If liveEvents.baseUrl
is not provided, the integration will continue to function correctly. In such a configuration, to retrieve the latest information from the target system, the scheduledResyncInterval
parameter has to be set, or a manual resync will need to be triggered through Port's UI.
Scalable Mode for Large Integrations
If you are deploying the integration at scale and want to decouple the resync process from the live events process (recommended for large or high-throughput environments), you can enable scalable mode by adding the following flags to your Helm install command:
--set workload.kind="CronJob" \
--set workload.cron.resyncTimeoutMinutes=60 \
--set scheduledResyncInterval="'*/60 * * * *'" \
--set liveEvents.worker.enabled=true
The port_region
, port.baseUrl
, portBaseUrl
, port_base_url
and OCEAN__PORT__BASE_URL
parameters are used to select which instance of Port API will be used.
Port exposes two API instances, one for the EU region of Port, and one for the US region of Port.
- If you use the EU region of Port (https://app.port.io), your API URL is
https://api.port.io
. - If you use the US region of Port (https://app.us.port.io), your API URL is
https://api.us.port.io
.
To install the integration using ArgoCD:
- Create a
values.yaml
file inargocd/my-ocean-armorcode-integration
in your git repository with the content:
Remember to replace the placeholder for ARMORCODE_API_TOKEN
, ARMORCODE_API_URL
.
initializePortResources: true
scheduledResyncInterval: 120
integration:
identifier: my-ocean-armorcode-integration
type: armorcode
eventListener:
type: POLLING
config:
armorcodeApiUrl: ARMORCODE_API_URL
secrets:
armorcodeApiToken: ARMORCODE_API_TOKEN
- Install the
my-ocean-armorcode-integration
ArgoCD Application by creating the followingmy-ocean-armorcode-integration.yaml
manifest:
Remember to replace the placeholders for YOUR_PORT_CLIENT_ID
YOUR_PORT_CLIENT_SECRET
and YOUR_GIT_REPO_URL
.
Multiple sources ArgoCD documentation can be found here.
ArgoCD Application (click to expand)
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: my-ocean-armorcode-integration
namespace: argocd
spec:
destination:
namespace: my-ocean-armorcode-integration
server: https://kubernetes.default.svc
project: default
sources:
- repoURL: 'https://port-labs.github.io/helm-charts/'
chart: port-ocean
targetRevision: 0.8.5
helm:
valueFiles:
- $values/argocd/my-ocean-armorcode-integration/values.yaml
parameters:
- name: port.clientId
value: YOUR_PORT_CLIENT_ID
- name: port.clientSecret
value: YOUR_PORT_CLIENT_SECRET
- name: port.baseUrl
value: https://api.getport.io
- repoURL: YOUR_GIT_REPO_URL
targetRevision: main
ref: values
syncPolicy:
automated:
prune: true
selfHeal: true
syncOptions:
- CreateNamespace=true
The port_region
, port.baseUrl
, portBaseUrl
, port_base_url
and OCEAN__PORT__BASE_URL
parameters are used to select which instance of Port API will be used.
Port exposes two API instances, one for the EU region of Port, and one for the US region of Port.
- If you use the EU region of Port (https://app.port.io), your API URL is
https://api.port.io
. - If you use the US region of Port (https://app.us.port.io), your API URL is
https://api.us.port.io
.
- Apply your application manifest with
kubectl
:
kubectl apply -f my-ocean-armorcode-integration.yaml
This table summarizes the available parameters for the installation.
Parameter | Description | Required |
---|---|---|
port.clientId | Your Port client id | โ |
port.clientSecret | Your Port client secret | โ |
port.baseUrl | Your Port API URL - https://api.getport.io for EU, https://api.us.getport.io for US | โ |
integration.identifier | Change the identifier to describe your integration | โ |
integration.type | The integration type | โ |
integration.eventListener.type | The event listener type | โ |
integration.secrets.armorcodeApiToken | The ArmorCode API Token | โ |
integration.config.armorcodeApiUrl | The ArmorCode API URL. If not specified, the default will be https://api.armorcode.com | โ |
scheduledResyncInterval | The number of minutes between each resync | โ |
initializePortResources | Default true, When set to true the integration will create default blueprints and the port App config Mapping | โ |
For advanced configuration such as proxies or self-signed certificates, click here.
This workflow/pipeline will run the ArmorCode integration once and then exit, this is useful for scheduled ingestion of data.
If you want the integration to update Port in real time using webhooks you should use the Real-time (self-hosted) installation option
- GitHub
- Jenkins
- Azure Devops
- GitLab
Make sure to configure the following Github Secrets:
Parameter | Description | Required |
---|---|---|
OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_TOKEN | The ArmorCode API Token | โ |
OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_URL | The ArmorCode API URL. If not specified, the default will be https://api.armorcode.com | โ |
OCEAN__INITIALIZE_PORT_RESOURCES | Default true, When set to false the integration will not create default blueprints and the port App config Mapping | โ |
OCEAN__SEND_RAW_DATA_EXAMPLES | Enable sending raw data examples from the third party API to port for testing and managing the integration mapping. Default is true | โ |
OCEAN__INTEGRATION__IDENTIFIER | Change the identifier to describe your integration, if not set will use the default one | โ |
OCEAN__PORT__CLIENT_ID | Your port client id (How to get the credentials) | โ |
OCEAN__PORT__CLIENT_SECRET | Your port client (How to get the credentials) secret | โ |
OCEAN__PORT__BASE_URL | Your Port API URL - https://api.getport.io for EU, https://api.us.getport.io for US | โ |
Here is an example for armorcode-integration.yml
workflow file:
name: ArmorCode Exporter Workflow
on:
workflow_dispatch:
schedule:
- cron: '0 */1 * * *' # Determines the scheduled interval for this workflow. This example runs every hour.
jobs:
run-integration:
runs-on: ubuntu-latest
timeout-minutes: 30 # Set a time limit for the job
steps:
- uses: port-labs/ocean-sail@v1
with:
type: 'armorcode'
port_client_id: ${{ secrets.OCEAN__PORT__CLIENT_ID }}
port_client_secret: ${{ secrets.OCEAN__PORT__CLIENT_SECRET }}
port_base_url: https://api.getport.io
config: |
armorcode_api_token: ${{ secrets.OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_TOKEN }}
armorcode_api_url: ${{ secrets.OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_URL }}
Your Jenkins agent should be able to run docker commands.
Make sure to configure the following Jenkins Credentials
of Secret Text
type:
Parameter | Description | Required |
---|---|---|
OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_TOKEN | The ArmorCode API Token | โ |
OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_URL | The ArmorCode API URL. If not specified, the default will be https://api.armorcode.com | โ |
OCEAN__INITIALIZE_PORT_RESOURCES | Default true, When set to false the integration will not create default blueprints and the port App config Mapping | โ |
OCEAN__SEND_RAW_DATA_EXAMPLES | Enable sending raw data examples from the third party API to port for testing and managing the integration mapping. Default is true | โ |
OCEAN__INTEGRATION__IDENTIFIER | Change the identifier to describe your integration, if not set will use the default one | โ |
OCEAN__PORT__CLIENT_ID | Your port client id (How to get the credentials) | โ |
OCEAN__PORT__CLIENT_SECRET | Your port client (How to get the credentials) secret | โ |
OCEAN__PORT__BASE_URL | Your Port API URL - https://api.getport.io for EU, https://api.us.getport.io for US | โ |
OCEAN__BASE_URL | The host of the Port Ocean app. Used to set up the integration endpoint as the target for webhooks created in ArmorCode | โ |
Here is an example for Jenkinsfile
groovy pipeline file:
pipeline {
agent any
stages {
stage('Run ArmorCode Integration') {
steps {
script {
withCredentials([
string(credentialsId: 'OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_TOKEN', variable: 'OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_TOKEN'),
string(credentialsId: 'OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_URL', variable: 'OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_URL'),
string(credentialsId: 'OCEAN__PORT__CLIENT_ID', variable: 'OCEAN__PORT__CLIENT_ID'),
string(credentialsId: 'OCEAN__PORT__CLIENT_SECRET', variable: 'OCEAN__PORT__CLIENT_SECRET'),
]) {
sh('''
#Set Docker image and run the container
integration_type="armorcode"
version="latest"
image_name="ghcr.io/port-labs/port-ocean-${integration_type}:${version}"
docker run -i --rm --platform=linux/amd64 \
-e OCEAN__EVENT_LISTENER='{"type":"ONCE"}' \
-e OCEAN__INITIALIZE_PORT_RESOURCES=true \
-e OCEAN__SEND_RAW_DATA_EXAMPLES=true \
-e OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_TOKEN=$OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_TOKEN \
-e OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_URL=$OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_URL \
-e OCEAN__PORT__CLIENT_ID=$OCEAN__PORT__CLIENT_ID \
-e OCEAN__PORT__CLIENT_SECRET=$OCEAN__PORT__CLIENT_SECRET \
-e OCEAN__PORT__BASE_URL='https://api.getport.io' \
$image_name
exit $?
''')
}
}
}
}
}
}
Your Azure Devops agent should be able to run docker commands.
Make sure to configure the following variables using Azure Devops variable groups. Add them into in a variable group named port-ocean-credentials
:
Parameter | Description | Required |
---|---|---|
OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_TOKEN | The ArmorCode API Token | โ |
OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_URL | The ArmorCode API URL. If not specified, the default will be https://api.armorcode.com | โ |
OCEAN__INITIALIZE_PORT_RESOURCES | Default true, When set to false the integration will not create default blueprints and the port App config Mapping | โ |
OCEAN__SEND_RAW_DATA_EXAMPLES | Enable sending raw data examples from the third party API to port for testing and managing the integration mapping. Default is true | โ |
OCEAN__INTEGRATION__IDENTIFIER | Change the identifier to describe your integration, if not set will use the default one | โ |
OCEAN__PORT__CLIENT_ID | Your port client id (How to get the credentials) | โ |
OCEAN__PORT__CLIENT_SECRET | Your port client (How to get the credentials) secret | โ |
OCEAN__PORT__BASE_URL | Your Port API URL - https://api.getport.io for EU, https://api.us.getport.io for US | โ |
Here is an example for armorcode-integration.yml
pipeline file:
trigger:
- main
pool:
vmImage: "ubuntu-latest"
variables:
- group: port-ocean-credentials # OCEAN__PORT__CLIENT_ID, OCEAN__PORT__CLIENT_SECRET, OCEAN__INTEGRATION__CONFIG__TOKEN
steps:
- script: |
echo Add other tasks to build, test, and deploy your project.
# Set Docker image and run the container
integration_type="armorcode"
version="latest"
image_name="ghcr.io/port-labs/port-ocean-$integration_type:$version"
docker run -i --rm \
-e OCEAN__EVENT_LISTENER='{"type":"ONCE"}' \
-e OCEAN__INITIALIZE_PORT_RESOURCES=true \
-e OCEAN__SEND_RAW_DATA_EXAMPLES=true \
-e OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_TOKEN=$OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_TOKEN \
-e OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_URL=$OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_URL \
-e OCEAN__PORT__CLIENT_ID=$(OCEAN__PORT__CLIENT_ID) \
-e OCEAN__PORT__CLIENT_SECRET=$(OCEAN__PORT__CLIENT_SECRET) \
-e OCEAN__PORT__BASE_URL='https://api.getport.io' \
$image_name
exit $?
displayName: 'Ingest ArmorCode Data into Port'
Make sure to configure the following GitLab variables:
Parameter | Description | Required |
---|---|---|
OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_TOKEN | The ArmorCode API Token | โ |
OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_URL | The ArmorCode API URL. If not specified, the default will be https://api.armorcode.com | โ |
OCEAN__INITIALIZE_PORT_RESOURCES | Default true, When set to false the integration will not create default blueprints and the port App config Mapping | โ |
OCEAN__SEND_RAW_DATA_EXAMPLES | Enable sending raw data examples from the third party API to port for testing and managing the integration mapping. Default is true | โ |
OCEAN__INTEGRATION__IDENTIFIER | Change the identifier to describe your integration, if not set will use the default one | โ |
OCEAN__PORT__CLIENT_ID | Your port client id (How to get the credentials) | โ |
OCEAN__PORT__CLIENT_SECRET | Your port client (How to get the credentials) secret | โ |
OCEAN__PORT__BASE_URL | Your Port API URL - https://api.getport.io for EU, https://api.us.getport.io for US | โ |
Here is an example for .gitlab-ci.yml
pipeline file:
default:
image: docker:24.0.5
services:
- docker:24.0.5-dind
before_script:
- docker info
variables:
INTEGRATION_TYPE: armorcode
VERSION: latest
stages:
- ingest
ingest_data:
stage: ingest
variables:
IMAGE_NAME: ghcr.io/port-labs/port-ocean-$INTEGRATION_TYPE:$VERSION
script:
- |
docker run -i --rm --platform=linux/amd64 \
-e OCEAN__EVENT_LISTENER='{"type":"ONCE"}' \
-e OCEAN__INITIALIZE_PORT_RESOURCES=true \
-e OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_TOKEN=$OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_TOKEN \
-e OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_URL=$OCEAN__INTEGRATION__CONFIG__ARMORCODE_API_URL \
-e OCEAN__PORT__CLIENT_ID=$OCEAN__PORT__CLIENT_ID \
-e OCEAN__PORT__CLIENT_SECRET=$OCEAN__PORT__CLIENT_SECRET \
-e OCEAN__PORT__BASE_URL='https://api.getport.io' \
$IMAGE_NAME
rules: # Run only when changes are made to the main branch
- if: '$CI_COMMIT_BRANCH == "main"'
The port_region
, port.baseUrl
, portBaseUrl
, port_base_url
and OCEAN__PORT__BASE_URL
parameters are used to select which instance of Port API will be used.
Port exposes two API instances, one for the EU region of Port, and one for the US region of Port.
- If you use the EU region of Port (https://app.port.io), your API URL is
https://api.port.io
. - If you use the US region of Port (https://app.us.port.io), your API URL is
https://api.us.port.io
.
For advanced configuration such as proxies or self-signed certificates, click here.
Configurationโ
Port integrations use a YAML mapping block to ingest data from the third-party api into Port.
The mapping makes use of the JQ JSON processor to select, modify, concatenate, transform and perform other operations on existing fields and values from the integration API.
Default mapping configurationโ
This is the default mapping configuration for this integration:
Default mapping configuration (click to expand)
deleteDependentEntities: true
createMissingRelatedEntities: true
enableMergeEntity: true
resources:
- kind: product
selector:
query: 'true'
port:
entity:
mappings:
blueprint: '"armorcodeProduct"'
identifier: .id | tostring
title: .name
properties:
name: .name
description: .description
businessOwner: .business_owner
securityOwner: .security_owner
- kind: sub-product
selector:
query: 'true'
port:
entity:
mappings:
blueprint: '"armorcodeSubProduct"'
identifier: .id | tostring
title: .name
properties:
name: .name
repoLink: .repo_link
programmingLanguage: .programming_language
technologies: .technologies
relations:
product: .product_id
- kind: finding
selector:
query: 'true'
port:
entity:
mappings:
blueprint: '"armorcodeFinding"'
identifier: .id | tostring
title: .title
properties:
source: .source
description: .description
mitigation: .mitigation
severity: .severity
findingCategory: .finding_category
status: .status
productStatus: .product_status
subProductStatuses: .sub_product_statuses
title: .title
toolSeverity: .tool_severity
createdAt: .created_at
lastUpdated: .last_updated
cwe: .cwe
cve: .cve
link: .link
riskScore: .risk_score
findingScore: .finding_score
relations:
product: .product_id
subProduct: .sub_product_id
Monitoring and sync statusโ
To learn more about how to monitor and check the sync status of your integration, see the relevant documentation.
Examplesโ
Examples of blueprints and the relevant integration configurations:
Productโ
Product blueprint (click to expand)
{
"identifier": "armorcodeProduct",
"title": "Armorcode Product",
"icon": "Package",
"schema": {
"properties": {
"name": {
"type": "string",
"title": "Name"
},
"description": {
"type": "string",
"title": "Description"
},
"businessOwner": {
"type": "string",
"title": "Business Owner"
},
"securityOwner": {
"type": "string",
"title": "Security Owner"
}
},
"required": [
"name"
]
},
"mirrorProperties": {},
"calculationProperties": {},
"relations": {}
}
Integration configuration (click to expand)
createMissingRelatedEntities: true
deleteDependentEntities: true
resources:
- kind: products
selector:
query: 'true'
port:
entity:
mappings:
blueprint: '"armorcodeProduct"'
identifier: .id | tostring
title: .name
properties:
name: .name
description: .description
businessOwner: .business_owner
securityOwner: .security_owner
Sub-Productโ
Sub-Product blueprint (click to expand)
{
"identifier": "armorcodeSubProduct",
"title": "Armorcode Sub-Product",
"icon": "Git",
"schema": {
"properties": {
"name": {
"type": "string",
"title": "Name"
},
"repoLink": {
"type": "string",
"title": "Repository Link",
"format": "url"
},
"programmingLanguage": {
"type": "string",
"title": "Language"
},
"technologies": {
"type": "array",
"title": "Technologies",
"items": {
"type": "string"
}
}
},
"required": [
"name"
]
},
"mirrorProperties": {},
"calculationProperties": {},
"relations": {
"product": {
"title": "Product",
"target": "armorcodeProduct",
"required": false,
"many": false
}
}
}
Integration configuration (click to expand)
createMissingRelatedEntities: true
deleteDependentEntities: true
resources:
- kind: sub_products
selector:
query: 'true'
port:
entity:
mappings:
blueprint: '"armorcodeSubProduct"'
identifier: .id | tostring
title: .name
properties:
name: .name
repoLink: .repo_link
programmingLanguage: .programming_language
technologies: .technologies
relations:
product: .product_id
Findingโ
Finding blueprint (click to expand)
{
"identifier": "armorcodeFinding",
"title": "ArmorCode Finding",
"icon": "Bug",
"schema": {
"properties": {
"source": {
"title": "Source",
"type": "string",
"description": "The security tool that generated this finding"
},
"description": {
"title": "Description",
"type": "string",
"description": "Detailed description of the security finding"
},
"mitigation": {
"title": "Mitigation",
"type": "string",
"description": "Recommended mitigation steps for this finding"
},
"severity": {
"type": "string",
"title": "Severity",
"enum": [
"CRITICAL",
"HIGH",
"MEDIUM",
"LOW",
"INFORMATIONAL",
"UNKNOWN"
],
"enumColors": {
"CRITICAL": "red",
"HIGH": "orange",
"MEDIUM": "yellow",
"LOW": "darkGray",
"INFORMATIONAL": "silver",
"UNKNOWN": "lightGray"
}
},
"findingCategory": {
"title": "Finding Category",
"type": "string",
"description": "Category classification of the finding"
},
"status": {
"type": "string",
"title": "Status",
"enum": [
"OPEN",
"CLOSED",
"ACTIVE",
"IN_PROGRESS",
"RESOLVED",
"TRIAGE",
"CONTROLLED",
"SUPPRESS",
"MITIGATED"
],
"enumColors": {
"OPEN": "paleBlue",
"ACTIVE": "olive",
"CLOSED": "lightGray",
"RESOLVED": "green",
"IN_PROGRESS": "orange",
"TRIAGE": "yellow",
"CONTROLLED": "purple",
"SUPPRESS": "darkGray",
"MITIGATED": "lime"
}
},
"productStatus": {
"title": "Product Status",
"type": "string",
"description": "Status of the product containing this finding"
},
"subProductStatuses": {
"title": "Sub-Product Status",
"type": "string",
"description": "Status of the sub-product containing this finding"
},
"title": {
"title": "Title",
"type": "string",
"description": "Brief title describing the finding"
},
"toolSeverity": {
"title": "Tool Severity",
"type": "string",
"description": "Original severity as reported by the security tool"
},
"createdAt": {
"title": "Created At",
"type": "string",
"description": "When the finding was first created"
},
"lastUpdated": {
"title": "Last Updated",
"type": "string",
"format": "date-time",
"description": "When the finding was last updated"
},
"cwe": {
"title": "CWE",
"type": "array",
"description": "Common Weakness Enumeration identifiers",
"items": {
"type": "string"
}
},
"cve": {
"title": "CVE",
"type": "array",
"description": "Common Vulnerabilities and Exposures identifiers",
"items": {
"type": "string"
}
},
"link": {
"title": "Link to Finding",
"type": "string",
"format": "url",
"description": "Direct link to the finding in ArmorCode"
},
"riskScore": {
"title": "Risk Score",
"type": "number",
"description": "Calculated risk score for the finding"
},
"findingScore": {
"title": "Finding Score",
"type": "number",
"description": "ArmorCode finding score"
}
},
"required": [
"title",
"status",
"severity",
"source",
"findingCategory"
]
},
"mirrorProperties": {},
"calculationProperties": {},
"aggregationProperties": {},
"relations": {
"product": {
"title": "Product",
"target": "armorcodeProduct",
"required": true,
"many": false
},
"subProduct": {
"title": "Sub-Product",
"target": "armorcodeSubProduct",
"required": true,
"many": false
}
}
}
Integration configuration (click to expand)
createMissingRelatedEntities: true
deleteDependentEntities: true
resources:
- kind: findings
selector:
query: 'true'
port:
entity:
mappings:
blueprint: '"armorcodeFinding"'
identifier: .id | tostring
title: .title
properties:
source: .source
description: .description
mitigation: .mitigation
severity: .severity
findingCategory: .finding_category
status: .status
productStatus: .product_status
subProductStatuses: .sub_product_statuses
title: .title
toolSeverity: .tool_severity
createdAt: .created_at
lastUpdated: .last_updated
cwe: .cwe
cve: .cve
link: .link
riskScore: .risk_score
findingScore: .finding_score
relations:
product: .product_id
subProduct: .sub_product_id
Let's Test Itโ
This section includes a sample response data from ArmorCode. In addition, it includes the entity created from the resync event based on the Ocean configuration provided in the previous section.
Payloadโ
Here is an example of the payload structure from ArmorCode:
Product response data (click to expand)
{
"id": 1,
"name": "E-commerce Platform",
"description": "Main e-commerce application for online retail",
"business_owner": "John Smith",
"security_owner": "Sarah Johnson",
"created_at": "2024-01-15T10:30:00Z",
"updated_at": "2024-01-20T14:45:00Z"
}
Sub-Product response data (click to expand)
{
"id": 101,
"name": "payment-service",
"repo_link": "https://github.com/company/payment-service",
"programming_language": "Java",
"technologies": ["Spring Boot", "PostgreSQL", "Redis"],
"product_id": 1,
"created_at": "2024-01-15T10:30:00Z",
"updated_at": "2024-01-20T14:45:00Z"
}
Finding response data (click to expand)
{
"id": 1001,
"title": "SQL Injection Vulnerability",
"source": "SAST",
"description": "Potential SQL injection vulnerability detected in user input validation",
"mitigation": "Use parameterized queries and input validation",
"severity": "HIGH",
"finding_category": "Code Security",
"status": "OPEN",
"product_status": "ACTIVE",
"sub_product_statuses": "ACTIVE",
"tool_severity": "HIGH",
"created_at": "2024-01-15T10:30:00Z",
"last_updated": "2024-01-20T14:45:00Z",
"cwe": ["CWE-89"],
"cve": ["CVE-2023-1234"],
"link": "https://app.armorcode.com/findings/1001",
"risk_score": 8.5,
"finding_score": 7.2,
"product_id": 1,
"sub_product_id": 101
}