Collect Nucleus Security - Nucleus Unified Vulnerability Management logs
This document explains how to ingest Nucleus Security - Nucleus Unified Vulnerability Management logs to Google Security Operations using Amazon S3.
Nucleus Security provides a unified vulnerability management platform that aggregates and enriches vulnerability data from 150+ security tools, asset inventories, and threat intelligence sources. The platform enables organizations to prioritize and remediate critical exposures at scale through automated workflows, risk-based prioritization, and comprehensive reporting.
Before you begin
Make sure you have the following prerequisites:
- A Google SecOps instance
- Privileged access to Nucleus Security console with connector configuration permissions
- Privileged access to AWS (S3, IAM)
Configure Nucleus Security
To configure Nucleus Security to export vulnerability and asset data to S3, you must first set up the AWS connector in your Nucleus project.
- Sign in to your Nucleus Security console.
- Go to Integration Hub > Connector Setup.
- Select Amazon Web Services.
- In the Name field, enter a name for the connector (for example,
Chronicle S3 Export). - In the Description field, enter a description for this connector (for example,
Export to Chronicle via S3). - In the Authentication section, note the AWS External ID and AWS Account values displayed. You will use these values when creating the cross-account role in AWS.
- Leave this page open. You will return to complete the configuration after setting up AWS resources.
Configure AWS S3 bucket and IAM for Google SecOps
- Create Amazon S3 bucket following this user guide: Creating a bucket
- Save bucket Name and Region for future reference (for example,
nucleus-chronicle-export). - Create a User following this user guide: Creating an IAM user.
- Select the created User.
- Select Security credentials tab.
- Click Create Access Key in section Access Keys.
- Select Third-party service as Use case.
- Click Next.
- Optional: Add description tag.
- Click Create access key.
- Click Download .csv file to save the Access Key and Secret Access Key for future reference.
- Click Done.
- Select Permissions tab.
- Click Add permissions in section Permissions policies.
- Select Add permissions.
- Select Attach policies directly.
- Search for AmazonS3FullAccess policy.
- Select the policy.
- Click Next.
- Click Add permissions.
Create cross-account role for Nucleus
- In the AWS console, go to IAM > Roles > Create role.
- Select AWS account as the trusted entity type.
- Select Another AWS account.
- In the Account ID field, enter the AWS Account value you noted from the Nucleus connector setup page.
- Select Require external ID.
- In the External ID field, enter the AWS External ID value you noted from the Nucleus connector setup page.
- Click Next.
- Search for and select AmazonS3FullAccess policy.
- Click Next.
- In the Role name field, enter
NucleusAWSConnectorRole. - Click Create role.
- Select the newly created NucleusAWSConnectorRole role.
- Copy the ARN value (for example,
arn:aws:iam::123456789012:role/NucleusAWSConnectorRole). You will use this in the next section.
Configure Nucleus Security Amazon S3 connection
- Return to the Nucleus Security console where you left the AWS connector configuration page open.
- In the Authentication section, click the green plus button to add a new AWS role.
- In the Label field, enter a label for the role (for example,
Chronicle Export Role). - In the Role ARN field, enter the Amazon Resource Name (ARN) for the role you created in the previous section.
- Click Verify Credentials.
- Wait for the message confirming a successful connection to appear.
- In the S3 Data Upload section, select the checkbox to enable uploading asset and finding data to S3 buckets.
- In the S3 Bucket Name field, enter the name of the S3 bucket you created (for example,
nucleus-chronicle-export). - In the S3 Bucket Region dropdown, select the region matching your S3 bucket.
- In the AWS Access Key ID field, enter the access key you saved in step 11 of the AWS configuration.
- In the AWS Secret Access Key field, enter the secret key you saved in step 11 of the AWS configuration.
Click Save & Finish.
Configure a feed in Google SecOps to ingest Nucleus Security logs
- Go to SIEM Settings > Feeds.
- Click Add New Feed.
- On the next page, click Configure a single feed.
- Enter a unique name for the Feed name.
- Select Amazon S3 V2 as the Source type.
- Select Nucleus Security - Nucleus Unified Vulnerability Management as the Log type.
- Click Next and then click Submit.
Specify values for the following fields:
- S3 URI:
s3://nucleus-chronicle-export/ - Source deletion option: Select the deletion option according to your preference
- Maximum File Age: Include files modified in the last number of days (default is 180 days)
- Access Key ID: User access key with access to the S3 bucket
- Secret Access Key: User secret key with access to the S3 bucket
- Asset namespace: The asset namespace
- Ingestion labels: The label to be applied to the events from this feed
- S3 URI:
Click Next and then click Submit.
UDM mapping table
| Log Field | UDM Mapping | Logic |
|---|---|---|
| host_score | entity.asset.attribute.labels | Custom labels or attributes associated with the asset |
| risk_score | entity.asset.attribute.labels | |
| scan_type | entity.asset.attribute.labels | |
| status | entity.asset.deployment_status | Deployment status of the asset |
| asset_name | entity.asset.hostname | Hostname of the asset |
| ip_address | entity.asset.ip | IP address associated with the asset |
| asset_id | entity.asset.product_object_id | Product-specific identifier for the object |
| finding_name | entity.asset.vulnerabilities.description | Description of the vulnerability |
| finding_name | entity.asset.vulnerabilities.name | Name of the vulnerability |
| finding_severity | entity.asset.vulnerabilities.severity | Severity level of the vulnerability |
| nucleus_url | entity.url | URL of the entity |
| metadata.entity_type | metadata.entity_type | Type of entity |
| metadata.product_name | metadata.product_name | Name of the product that generated the event |
| metadata.vendor_name | metadata.vendor_name | Name of the vendor that produced the product |
Need more help? Get answers from Community members and Google SecOps professionals.