Connecting to external security scanning tools and platforms by using plug-ins
IBM® Guardium® Cryptography Manager empowers users to identify IT assets and their corresponding cryptographic objects through its robust plug-ins framework. This framework includes a set ready-to-use plug-ins that are available on the IBM Passport Advantage® portal and also supports the creation of custom plug-ins for platforms that do not have native integration.
Types of plug-ins
There are two types of plug-ins
- Available plug-ins offered by Guardium Cryptography Manager
- Custom plug-ins that you can develop based on your business needs. See Developing a plug-in by using the plug-in toolkit topic.
Available plug-ins
The following plug-ins are provided with Guardium Cryptography Manager.
- Amazon Web Services
- Google cloud platform
- Microsoft Azure
- Rapid7 InsightVM
- Sectigo Certificate Manager
- Tenable Security Center
- Venafi TLS Protect
These plug-ins enhance Guardium Cryptography Manager by enabling seamless integration and centralized management of cryptographic assets across your IT environment.
About plug-ins
Plug-ins are modular components that enable integration with third-party security scanning tools and external platforms. They act as bridge between the external security systems. These plug-ins helps achieve the following:
- Discover cryptographic assets from multiple sources.
- Convert vendor-specific data into a standardized format used by Guardium Cryptography Manager.
- Extend the Guardium Cryptography Manager platform’s functionality without modifying the core product code.
Plug-in workflow
Any plug-in used to connect Guardium Cryptography Manager with an external platform follows these steps:
- Download the available plug-in from the IBM Passport Advantage portal or develop a new plug-in.
- Install the plug-in on Guardium Cryptography Manager. See Installing plug-ins topic.
- Integrate the external system with Guardium Cryptography Manager. See Integrating plug-ins topic.
- Discover plug-in related IT assets and associated cryptographic objects. See Managing plug-in discovery profile.