IBM Security Verify data mapping
The IBM® Security Verify Connected Assets and Risk connector incrementally synchronizes the contents of the Security Verify asset databases with the data that is managed by the Connected Assets and Risk service.
The following table shows the Connected Assets and Risk connector to Security Verify data mapping.
CAR vertex/edge | CAR field | IAM field |
---|---|---|
Users | username | name |
external_id | id | |
family_name | surname | |
mailId | ||
active | personStatus (Int value that is converted in Boolean 0 for true and 1 for false | |
employee_id | userCode | |
upn | upn | |
user_category | userCategory | |
title | title | |
department | department | |
job_title | job_title | |
cumulative_score | cumulativeScore | |
current_score | currentScore | |
critical | critical | |
high | high | |
medium | medium | |
low | low | |
first_occurrence | firstOccurrence | |
last_occurrence | lastOccurrence | |
Accounts | name | name |
external_id | id | |
created | creationDate | |
Active | disabled (Int value that is converted in Boolean 0 for true and 1 for false | |
compliance_status | complianceStatus | |
cumulative_score | cumulativeScore | |
current_score | currentScore | |
critical | critical | |
high | high | |
medium | medium | |
low | low | |
first_occurrence | firstOccurrence | |
last_occurrence | lastOccurrence | |
Applications | name | name |
external_id | id | |
description | description | |
owner | owner | |
owner_code | ownerCode | |
threat_score | threatCcore | |
app_type | appType | |
cumulative_score | cumulativeScore | |
current_score | currentScore | |
critical | critical | |
high | high | |
medium | medium | |
low | low | |
first_occurrence | firstOccurrence | |
last_occurrence | lastOccurrence | |
UserAccounts | external_id | id |
_from_external_id | userId | |
_to_external_id | accountId | |
timestamp | lastUpdatedTime | |
AccountApplications | external_id | id |
_from_external_id | accountId | |
_to_external_id | applicationId | |
timestamp | lastUpdatedTime |
The following list provides further details on the Connected Assets and Risk connector mapping.
- User vertex
- The User is an entity in IBM Security Verify Tenant data and maps to the user node in Connected Assets and Risk. If any user is deleted, the corresponding users are also deleted in Connected Assets and Risk.
- Application vertex
- The Application is an entity in IBM Security Verify tenant and maps to application node in Connected Assets and Risk. If any application is deleted, the corresponding applications are also deleted in Connected Assets and Risk.
- Account vertex
- The Account is an entity in IBM Security Verify tenant and maps to account node in Connected Assets and Risk. If any account is deleted, the corresponding account is also deleted in Connected Assets and Risk.
- UserAccount edge
- The UserAccount is a relationship between the User and Account entities. This relationship or edge is available in IBM Security Verify tenant and it is considered a UserAccount edge in Connected Assets and Risk.
- AccountApplications edge
- The AccountApplication is a relationship between Account and Application entities. This relationship or edge is available in IBM Security Verify tenant and it is considered an AccountApplication edge in Connected Assets and Risk.