Snyk Logs

Panther supports pulling logs directly from Snyk

Overview

Panther has the ability to fetch Snyk audit logs by querying the Snyk Audit API.

Panther monitors all events listed in the Snyk Audit Logs documentation except api.access events. Instead of api.access events, it is recommended to use Snyk's explicit action logs, as they contain richer contextual information for each action.

By default, Snyk logs do not contain human-readable values for objects such as vaults and login credentials. Please see this Lookup Table guide to learn how to translate Universally Unique Identifier (UUID) values into human-readable names.

Video overview

How to onboard Snyk logs to Panther

Step 1: Generate an API token in Snyk

To use the Snyk API, you must first retrieve an API token from Snyk. For more information on using Snyk's API, see the Snyk documentation: Authentication for API.

Alternatively, you can use a service account that has a role with audit log access. For more information, see Snyk's Service accounts documentation.

  1. Go to Account Settings > General.

Step 2: Create a new Snyk log source in Panther

  1. In the left-hand navigation bar of your Panther Console, click Configure > Log Sources.

  2. Click Create New.

  3. Search for “Synk,” then click its tile.

  4. On the slide-out panel, click Start Setup.

  5. On the next screen, enter in a descriptive name for the source e.g. My Snyk logs.

  6. Click Setup.

  7. On the Set Credentials page, fill in the form:

    • Organization Id: Enter your Snyk organization ID.

    • API Token: Enter the API token from your Snyk account.

  8. Click Setup. You will be directed to a success screen:

    • You can optionally enable one or more Detection Packs.

    • The Trigger an alert when no events are processed setting defaults to YES. We recommend leaving this enabled, as you will be alerted if data stops flowing from the log source after a certain period of time. The timeframe is configurable, with a default of 24 hours.

Supported log types

Snyk.GroupAudit

Snyk.GroupAudit item usage. Reference: https://docs.snyk.io/snyk-api/reference/audit-logs

schema: Snyk.GroupAudit
description: Audit logs of your group.
referenceURL: https://docs.snyk.io/snyk-api/reference/audit-logs
fields:
  - name: groupId
    description: The group id
    type: string
  - name: orgId
    description: The organization id
    type: string
  - name: userId
    description: The user id
    type: string
    indicators:
      - actor_id
  - name: projectId
    description: The project id
    type: string
  - name: event
    required: true
    description: The event type
    type: string
  - name: created
    required: true
    description: The date and time of the event in rfc3339 standard format
    type: timestamp
    timeFormats:
      - rfc3339
    isEventTime: true
  - name: content
    description: The content relating to the event
    type: json

Snyk.OrgAudit

Snyk.OrgAudit item usage. Reference: https://docs.snyk.io/snyk-api/reference/audit-logs

schema: Snyk.OrgAudit
description: Audit logs of your organization.
referenceURL: https://docs.snyk.io/snyk-api/reference/audit-logs
fields:
  - name: groupId
    description: The group id
    type: string
  - name: orgId
    description: The organization id
    type: string
  - name: userId
    description: The user id
    type: string
    indicators:
      - actor_id
  - name: projectId
    description: The project id
    type: string
  - name: event
    required: true
    description: The event type
    type: string
  - name: created
    required: true
    description: The date and time of the event in rfc3339 standard format
    type: timestamp
    timeFormats:
      - rfc3339
    isEventTime: true
  - name: content
    description: The content relating to the event
    type: json

Last updated

Was this helpful?