Loading

JupiterOne Integration for Elastic

Version 0.1.0 (View all)
Subscription level
What's this?
Basic
Developed by
What's this?
Elastic
Ingestion method(s) API
Minimum Kibana version(s) 9.4.0
9.3.1
9.2.4
9.1.10
8.19.10
The JupiterOne integration v0.1.0 is in beta

To use beta integrations, go to the Integrations page in Kibana, scroll down, and toggle on the Display beta integrations option.

JupiterOne provides continuous monitoring to surface problems impacting critical assets and infrastructure. Secure your attack surface with continuous asset discovery and attack path analysis. Reduce risk, triage incidents, and prioritize vulnerability findings with greater clarity and 85% fewer SecOps resources.

The JupiterOne integration for Elastic allows you to collect logs using JupiterOne API, then visualise the data in Kibana.

The JupiterOne integration uses the GraphQL endpoint to collect assests.

This integration periodically queries the JupiterOne API to retrieve details for assets of class alert, vulnerability, and finding.

This integration collects assets of the following classes:

Integrating JupiterOne Alert, Finding, and Vulnerability data with SIEM dashboards delivers unified visibility into risk signals, asset classifications, and security posture across the environment. Dashboards summarize asset class, type, and source distributions, highlight classification and status trends, and surface key risk attributes such as category, level, and severity. Time-based severity trends, MITRE mappings, and product or device-based breakdowns help analysts understand threat patterns and prioritize response. Metrics for open alerts, closed alerts, open vulnerabilities, and affected entities provide quick operational insight, while tables of top device IPs and product versions add valuable investigative context. Together, these visualizations enable teams to track risks, monitor asset health, and strengthen overall detection and remediation efforts.

This integration installs Elastic latest transforms. For more details, check the Transform setup and requirements.

To collect data from JupiterOne, Authentication is handled using a API Token and Account ID, which serve as the required credentials.

  1. Log in to the account you want to manage.
  2. Go to Settings > Account Management.
  3. In the left panel, click the Key Icon.
  4. In the User API Keys page, click Add.
  5. In the API Keys modal, enter the name of the key and the number of days before it expires, and click Create.

For more details, check Documentation.

This integration supports both Elastic Agentless-based and Agent-based installations.

Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to Agentless integrations and the Agentless integrations FAQ.

Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.

Elastic Agent must be installed. For more details, check the Elastic Agent installation instructions. You can install only one Elastic Agent per host.

  1. In the top search bar in Kibana, search for Integrations.

  2. In the search bar, type JupiterOne.

  3. Select the JupiterOne integration from the search results.

  4. Select Add JupiterOne to add the integration.

  5. Enable and configure only the collection methods which you will use.

    • To Collect assets from JupiterOne API, you'll need to:

      • Configure URL, Account ID and API Token.
      • Enable the dataset.
      • Adjust the integration configuration parameters if required, including the Interval, etc. to enable data collection.
  6. Select Save and continue to save the integration.

  1. In the top search bar in Kibana, search for Dashboards.
  2. In the search bar, type jupiter_one.
  3. Select a dashboard for the dataset you are collecting, and verify the dashboard information is populated.
  1. In the top search bar in Kibana, search for Transforms.
  2. Select the Data / Transforms from the search results.
  3. In the search bar, type jupiter_one.
  4. All transforms from the search results should indicate Healthy under the Health column.

For more information on architectures that can be used for scaling this integration, check the Ingest Architectures documentation.

These inputs can be used in this integration:

This integration dataset uses the following API:

To facilitate user and device data, source data stream-backed indices .ds-logs-jupiter_one.risks_and_alerts-* are allowed to contain duplicates from each polling interval. ILM policy logs-jupiter_one.risks_and_alerts-default_policy is added to these source indices, so it doesn't lead to unbounded growth. This means that in these source indices data will be deleted after 30 days from ingested date.

This integration includes one or more Kibana dashboards that visualizes the data collected by the integration. The screenshots below illustrate how the ingested data is displayed.