Loading

Cyera Integration for Elastic

Serverless Observability Serverless Security Stack 9.0.0

Version 0.4.0 Beta (View all)
Subscription level
What's this?
Basic
Level of support
What's this?
Elastic
Ingestion method(s) API

Cyera is a cloud data security platform (DSPM – Data Security Posture Management). It focuses on discovering, classifying, monitoring, and protecting sensitive data across cloud environments (AWS, Azure, GCP, SaaS, M365, Snowflake, etc.).

The Cyera integration for Elastic allows you to collect logs and visualize the data in Kibana.

This integration is compatible with different versions of Cyera APIs for respective data streams as below:

Data streams Version
Classification v1
Issue v3
Event v1
Datastore v2

This integration periodically queries the Cyera API to retrieve classifications, issues, events and datastores.

This integration collects log messages of the following types:

  • Classification: Collects classifications that have been identified by the Cyera system.

  • Issue: Collects issues that have been identified by the Cyera system.

  • Event: Collects all events from the Cyera system.

  • Datastore: Collects all datastore objects from the Cyera system.

Integrating Cyera Classification, Issues, Events and Datastore data streams with Elastic SIEM provides end-to-end visibility into where sensitive data resides, the risks tied to that data, and the security events triggered across cloud and SaaS environments. By correlating datastore metadata (such as type, provider, sensitivity, and ownership) with Cyera’s classification intelligence, issue context, and event activity in Elastic analytics, security teams can strengthen data security posture, accelerate incident response, and simplify compliance. Dashboards in Kibana present breakdowns by datastore type, sensitivity, category, severity, status, risk status, event type, and trends over time — enabling faster investigations, better prioritization, and improved accountability.

This integration installs Elastic latest transforms. For more details, check the Transform setup and requirements.

While collecting data through the Cyera APIs, authentication is handled using a Client ID and Client Secret, which serve as the required credentials. Any requests made without credentials will be rejected by the Cyera APIs.

  • Generate a Cyera API client, retrieve the Client ID and Client Secret.
  • Confirm your Cyera API URL, a default is loaded in the configuration.

This integration supports both Elastic Agentless-based and Agent-based installations.

Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to Agentless integrations and the Agentless integrations FAQ.

Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.

Elastic Agent must be installed. For more details, check the Elastic Agent installation instructions. You can install only one Elastic Agent per host.

  1. In the top search bar in Kibana, search for Integrations.

  2. In the search bar, type Cyera.

  3. Select the Cyera integration from the search results.

  4. Select Add Cyera to add the integration.

  5. Enable and configure only the collection methods which you will use.

    • To Collect Cyera logs via API, you'll need to:

      • Configure URL, Client ID, and Client Secret.
      • Enable/Disable the required datasets.
      • For each dataset, adjust the integration configuration parameters if required, including the Initial Interval, Interval, Batch Size etc. to enable data collection.
  6. Select Save and continue to save the integration.

  1. In Kibana, navigate to Dashboards.
  2. In the search bar, type cyera.
  3. Select a dashboard for the dataset you are collecting, and verify the dashboard information is populated.
  1. In Kibana, navigate to Management > Stack Management.
  2. Under Data, select Transforms.
  3. In the search bar, type cyera.
  4. All transforms from the search results should indicate Healthy under the Health column.

For more information on architectures that can be used for scaling this integration, check the Ingest Architectures documentation.

These inputs can be used in this integration:

To facilitate classification, datastore, issues and event data, source data stream-backed indices .ds-logs-cyera.<data_stream_name>-* are allowed to contain duplicates from each polling interval. ILM policy logs-cyera.<data_stream_name>-default_policy is added to these source indices, so it doesn't lead to unbounded growth. This means that in these source indices data will be deleted after 30 days from ingested date.

This integration includes one or more Kibana dashboards that visualizes the data collected by the integration. The screenshots below illustrate how the ingested data is displayed.