IBM Security Verify data mapping

The IBM® Security Verify Connected Assets and Risk connector incrementally synchronizes the contents of the Security Verify asset databases with the data that is managed by the Connected Assets and Risk service.

The following table shows the Connected Assets and Risk connector to Security Verify data mapping.

Table 1. Security Verify data mapping
CAR vertex/edge CAR field IAM field
Users username name
  external_id id
  family_name surname
  email mailId
  active personStatus (Int value that is converted in Boolean 0 for true and 1 for false
  employee_id userCode
  upn upn
  user_category userCategory
  title title
  department department
  job_title job_title
  cumulative_score cumulativeScore
  current_score currentScore
  critical critical
  high high
  medium medium
  low low
  first_occurrence firstOccurrence
  last_occurrence lastOccurrence
Accounts name name
  external_id id
  created creationDate
  Active disabled (Int value that is converted in Boolean 0 for true and 1 for false
  compliance_status complianceStatus
  cumulative_score cumulativeScore
  current_score currentScore
  critical critical
  high high
  medium medium
  low low
  first_occurrence firstOccurrence
  last_occurrence lastOccurrence
Applications name name
  external_id id
  description description
  owner owner
  owner_code ownerCode
  threat_score threatCcore
  app_type appType
  cumulative_score cumulativeScore
  current_score currentScore
  critical critical
  high high
  medium medium
  low low
  first_occurrence firstOccurrence
  last_occurrence lastOccurrence
UserAccounts external_id id
  _from_external_id userId
  _to_external_id accountId
  timestamp lastUpdatedTime
AccountApplications external_id id
  _from_external_id accountId
  _to_external_id applicationId
  timestamp lastUpdatedTime

The following list provides further details on the Connected Assets and Risk connector mapping.

User vertex
The User is an entity in IBM Security Verify Tenant data and maps to the user node in Connected Assets and Risk. If any user is deleted, the corresponding users are also deleted in Connected Assets and Risk.
Application vertex
The Application is an entity in IBM Security Verify tenant and maps to application node in Connected Assets and Risk. If any application is deleted, the corresponding applications are also deleted in Connected Assets and Risk.
Account vertex
The Account is an entity in IBM Security Verify tenant and maps to account node in Connected Assets and Risk. If any account is deleted, the corresponding account is also deleted in Connected Assets and Risk.
UserAccount edge
The UserAccount is a relationship between the User and Account entities. This relationship or edge is available in IBM Security Verify tenant and it is considered a UserAccount edge in Connected Assets and Risk.
AccountApplications edge
The AccountApplication is a relationship between Account and Application entities. This relationship or edge is available in IBM Security Verify tenant and it is considered an AccountApplication edge in Connected Assets and Risk.