This article explains how to connect Lacework to Expel Workbench.

Prerequisites

Step 1: Enable Console Access

Create a user in Lacework for Workbench or create an SSO user for Workbench with access to Lacework.

Step 2: Generate API credentials

Lacework provides a combination of API Access keys and tokens to be used by clients and client applications to access the Lacework API. API access key IDs and secret access keys are created using the Lacework Console. Temporary access (bearer) tokens, used by clients, are created using the Lacework API.

Only administrators can create API access keys, with a limit of two per user. An API access key doesn't expire but can be disabled or deleted. After creation, administrators can download and securely store the secret key.

To create an API key:

  1. In Lacework, navigate to Settings > Configuration > API Keys.

  2. On the Service user API keys tab, click + Add New.

  3. Type a name for the key and an optional description and click Save.

  4. To get the secret key, download the generated API key file and open it in an editor.

    Docs reference: https://docs.lacework.net

Step 3: Add Lacework as a Security Device in Workbench

  1. Log in to Workbench.

  2. In the side menu, navigate to Settings > Security Devices.

  3. At the top of the page, click Add Security Device.

  4. Search for "Lacework" and select the integration.

    Screen Shot 2021-03-05 at 12.29.16 PM.png
  5. Complete all fields using the credentials and information you collected in Step 1 and Step 2.

    • Name - enter the host name of the Lacework device.

    • Location - enter the location of your integration, for example “cloud;” this is also a text string that you can filter on, so we recommend being consistent with location naming across your Expel integrations.

    • URL - enter the host name or IP address of the Lacework management interface. Device IP can be found in the Lacework console under Dashboard > General Information > MGT IP Address.

    • API key ID - enter the API generated in Step 2.

    • API secret - enter secret generated in Step 2.

  6. You can provide console access now or set it up later. Use the instructions below to set it up later.

Step 4: Edit the Device to Add Console Access

Expel needs console access to your device to allow our SOC analysts to dig deeper during incident investigations. Additionally, our engineering teams use this access to investigate potential health issues, including proper alert ingestion.