Rapid7 Insight AppSec Connector

The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the Tenable FedRAMP Product Offering.

Rapid7 Insight AppSec performs black-box security testing to automate identification, triage vulnerabilities, prioritize actions, and remediate application risk.

Tip: For more information on how third-party integrations work, see Connectors.

Connector Details

Details Description

Supported products

Rapid7 Insight AppSec

Category

DAST

Ingested data

Assets and Findings

Ingested Asset Classes

Web Application

Integration type

UNI directional (data is transferred from the Connector to Tenable Exposure Management in one direction)

Supported version and type

SaaS (latest)

Prerequisites and User Permissions

Before you begin configuring the connector, make sure to:

  • Create or use a Rapid7 Insight AppSec user with Admin permissions.

  • Identify your server URL (e.g., https://YOURREGION.api.insight.rapid7.com/ias/v1)

Add a Connector

To add a new connector:

  1. In the left navigation menu, click Connectors.

    The Connectors page appears.

  2. In the upper-right corner, click Add new connector.

    The Connector Library appears.

  3. In the search box, type the name of the connector.

  4. On the tile for the connector, click Connect.

    The connector configuration options appear.

Configure the Connector

To configure the connector:

  1. (Optional) In the Connector's Name text box, type a descriptive name for the connector.

  2. (Optional) To use a preconfigured on-prem connector to connect to this connector, from the Gateway drop-down, select the on-prem connector you want to use for the connector. Otherwise, select Don't use gateway.

    Note: For information about configuring a gateway, see Tenable On-Prem Connector.
  3. In the Server URL text box, type the server URL for your Rapid7 application.
  4. In the API Key text box, paste the secret credentials you generated in Rapid7.

  5. Data pulling configuration: This configuration has dynamic settings tailored to the specific connector and integration type. Below are the configurations relevant to this connector.

    • In the Asset Retention text box, type the number of days after which you want assets to be removed from Tenable Exposure Management. If an asset has not been detected or updated within the specified number of days, it is automatically removed from the application, ensuring your asset inventory is current and relevant.

      Tip: For more information, see Asset Retention.
  6. In the Test connectivity section, click the Test Connectivity button to verify that Tenable Exposure Management can connect to your connector instance.

    • A successful connectivity test confirms that the platform can connect to the connector instance. It does not, however, guarantee that the synchronization process will succeed, as additional syncing or processing issues may arise.

    • If the connectivity test fails, an error message with details about the issue appears. Click Show tests for more information about the exact error.

  7. In the Connector scheduling section, configure the time and day(s) on which you want connector syncs to occur.

    Tip: For more information, see Connector Scheduling.
  8. Click Create. Tenable Exposure Management begins syncing the connector. The sync can take some time to complete.

  9. To confirm the sync is complete, do the following:

Rapid7 Insight AppSec in Tenable Exposure Management

Locate Connector Assets in Tenable Exposure Management

As the connector discovers assets, Tenable Exposure Management ingests those devices for reporting.

To view assets by connector:

  1. In Tenable Exposure Management, navigate to the Assets page.

  2. In the Filters section, under 3rd Party Connectors, click the connector name for which you want to view assets.

    The asset list updates to show only assets from the selected connector.

  3. Click on any asset to view Asset Details.

Locate Connector Weaknesses in Tenable Exposure Management

As the connector discovers weaknesses, Tenable Exposure Management ingests those weaknesses for reporting.

To view weaknesses by connector: 

  1. In Tenable Exposure Management, navigate to the Weaknesses page.

  2. In the Filters section, under 3rd Party Connectors, click the connector name for which you want to view weaknesses.

    The weaknesses list updates to show only weaknesses from the selected connector.

  3. Click on any weakness to view Weakness Details.

Locate Connector Findings in Tenable Exposure Management

As the connector discovers individual findings, Tenable Exposure Management ingests those findings for reporting.

To view findings by connector:

  1. In Tenable Exposure Management, navigate to the Findings page.

  2. In the Filters section, under 3rd Party Connectors, click the connector name for which you want to view findings

    The findings list updates to show only assets from the selected connector.

  3. Click on any asset to view Finding Details.

Data Mapping

Exposure Management integrates with the connector via API to retrieve relevant weakness and asset data, which is then mapped into the Exposure Management system. The following tables outline how fields and their values are mapped from the connector to Exposure Management.

Web Application Mapping

Tenable Exposure Management Value

Rapid7 Insight Appsec Value

Unique Identifier url_parent
Asset - Name root_cause.url
Asset - First Observation Date first_discovered
Asset - Last Observed At last_discovered
Asset - Webapp Homepage Screenshot Url

root_cause.url

Asset Custom Attributes

app description

rapid7 app ID

Finding Mapping

Tenable Exposure Management UI Field

Rapid7 Insight AppSec Field

Unique Identifier -
Finding Name data.name
Severity Driver cve.base_score or vulnerability_score
Description data.description
First Seen first_discovered
Last seen (Observed) last_discovered
Finding Custom Attributes

module id

detailed description

references

CVSS3 vector

rapid7 severity

root cause method

root cause parameter

Finding Status Mapping

Tenable Exposure Management Status

Rapid7 Insight AppSec Status

Active

suppression_info.is_suppressed = TRUE

or

status = expired, open, reopen

Fixed

status = Closed

Note:For Rapi7 Insight Appsec, Exposure Management relies mostly on the status field to determine finding status. The suppression_info.is_suppressed field from the connector is also used in some cases.

Finding Severity Mapping

Tenable Exposure Management Severity

Rapid7 Insight AppSec Score

Critical

CVSS: 9-10

Severity: Critical

High

CVSS: 7-8

Severity: High

Medium

CVSS4-6

Severity: Medium

Low

CVSS: 1-3

Severity:Low

None

CVSS:0

Severtity: empty

Note:For Rapid7 Insight Appsec, Exposure Management uses the cve.base_score field to determine severity. If cve.base_score not available, Exposure Management uses the ulnerabilitySeverityLevel field from the connector, if provided.

Status Update Mechanisms

Every day, Tenable Exposure Management syncs with the vendor's platform to receive updates on existing findings and assets and to retrieve new ones (if any were added).

The table below describes how the status update mechanism works in the connector for findings and assets ingested into Tenable Exposure Management.

Update Type in Exposure Management

Mechanism (When?)

Archiving Assets

Change a Finding status from "Active" to "Fixed"

  • Finding no longer appears in the scan findings

Note: Updates on the vendor side are reflected in Tenable Exposure Management only when the next scheduled connector sync time is complete (once a day).

Uniqueness Criteria

Tenable Exposure Management uses defined uniqueness criteria to determine whether an ingested asset or finding should be recognized as a distinct record. These criteria help define how assets and findings are identified and counted from each connector.

Tip:  Read all about Third-Party Data Deduplication in Tenable Exposure Management

The uniqueness criteria for this connector are as follows:

Data

Uniqueness Criteria

Asset

url_parent

API Endpoints in Use

API

Use in Tenable Exposure Management

{{ server_url }}/vulnerabilities

Findings

{{ server_url }}/modules

Findings enrichment

{{ server_url }}/apps

Assets