Rapid7 Hardening Guide
Vulnerability management platform hardening for Rapid7 InsightVM and Command Platform including SSO, console security, and user management
Overview
Rapid7 is a leading cybersecurity platform providing vulnerability management, SIEM, and threat detection for thousands of organizations worldwide. As a critical security tool with privileged access to infrastructure vulnerability data, Rapid7 configurations directly impact security visibility and incident response capabilities.
Intended Audience
- Security engineers managing vulnerability programs
- IT administrators configuring Rapid7 products
- GRC professionals using compliance features
- SOC analysts managing InsightVM and InsightIDR
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers Rapid7 Insight Platform and InsightVM Security Console security including SAML SSO, user management, console hardening, and Command Platform administration.
Table of Contents
- Authentication & SSO
- Console Security
- User & Access Management
- Monitoring & Compliance
- Compliance Quick Reference
1. Authentication & SSO
1.1 Configure Command Platform SSO
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.3, 12.5 |
| NIST 800-53 | IA-2, IA-8 |
Description
Configure SAML SSO for centralized authentication to the Rapid7 Command Platform.
Rationale
Why This Matters:
- Centralizes identity management across Rapid7 products
- Enforces organizational MFA policies
- Simplifies user provisioning and deprovisioning
- Required for enterprise security compliance
Prerequisites
- Rapid7 Insight Platform subscription
- Command Platform Administrator role
- SAML 2.0 compatible IdP
ClickOps Implementation
Step 1: Access SSO Settings
- Navigate to: Command Platform → Administration → Platform Settings
- Click SSO Settings tab
- Locate Authentication Settings section
Step 2: Upload SAML Certificate
- Obtain X.509 certificate from your IdP
- Certificate must be base64-encoded with DER encoding
- Upload certificate to Command Platform
Step 3: Configure Identity Provider
- Create SAML application in IdP (Okta, Azure, etc.)
- Configure required attribute mappings:
- FirstName: User’s first name
- LastName: User’s last name
- Email: User’s email address
- Map these labels exactly as shown
Step 4: Complete Configuration
- Enter IdP SSO URL
- Enter Entity ID
- Test SSO authentication
- Enable SSO enforcement
Time to Complete: ~1 hour
1.2 Configure InsightVM Console SSO
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 6.3, 12.5 |
| NIST 800-53 | IA-2, IA-8 |
Description
Configure SAML SSO directly on InsightVM Security Console for local authentication.
ClickOps Implementation
Step 1: Access SAML Configuration
- Navigate to: Administration → Authentication: 2FA and SSO
- Click Configure SAML Source
Step 2: Upload IdP Metadata
- Download IdP metadata XML file
- Click Choose File and select metadata
- Click Save
Step 3: Configure Base Entity URL
- If ACS URL includes hostname/FQDN:
- Set Base Entity URL:
https://<console-hostname>:3780
- Set Base Entity URL:
- Restart console services after applying
Step 4: Enable SAML Authorization
- Navigate to: Administration → User Management
- For each user, set SAML Authorization Method → SAML
- Ensure email addresses match exactly (case-sensitive)
Important: Enabling Command Platform Login disables local authentication after 60-day grace period.
1.3 Enforce Multi-Factor Authentication
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.5 |
| NIST 800-53 | IA-2(1) |
Description
Require MFA for all Rapid7 platform users.
ClickOps Implementation
Step 1: Configure via IdP (Recommended)
- Enable MFA in your identity provider
- All SSO users subject to IdP MFA policies
- Use phishing-resistant methods for admins
Step 2: Enable Console 2FA
- Navigate to: Administration → Authentication: 2FA and SSO
- Configure two-factor authentication settings
- Require 2FA for all console users
Step 3: Verify Enforcement
- Test login with MFA
- Verify no bypass is possible
- Document MFA methods
2. Console Security
2.1 Secure Console Access
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 13.5 |
| NIST 800-53 | AC-17 |
Description
Secure network access to the InsightVM Security Console.
ClickOps Implementation
Step 1: Configure HTTPS
- Console uses HTTPS by default on port 3780
- Install valid TLS certificate
- Replace self-signed certificate
Step 2: Restrict Network Access
- Limit console access to management networks
- Use firewall rules to restrict:
- Port 3780 (Web interface)
- Port 40814 (Scan engine communication)
- Block public internet access
Step 3: Configure Session Settings
- Navigate to: Administration → Security Console Configuration
- Set session timeout (15-30 minutes recommended)
- Enable session lockout after failed attempts
2.2 Harden Console Installation
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 4.1 |
| NIST 800-53 | CM-6 |
Description
Apply hardening configurations to the Security Console server.
ClickOps Implementation
Step 1: Update Console Regularly
- Navigate to: Administration → Updates
- Check for available updates
- Apply updates during maintenance windows
Step 2: Configure TLS Settings
- Disable weak ciphers
- Enforce TLS 1.2 or higher
- Configure strong cipher suites
Step 3: Secure Operating System
- Apply OS security patches
- Disable unnecessary services
- Configure host-based firewall
2.3 Configure Scan Engine Security
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 7.1 |
| NIST 800-53 | RA-5 |
Description
Secure scan engine configurations and communications.
ClickOps Implementation
Step 1: Secure Engine Communication
- Navigate to: Administration → Scan Engines
- Review all connected engines
- Ensure encrypted communication
Step 2: Manage Pairing Keys
- Generate unique pairing keys for each engine
- Rotate keys if compromised
- Remove inactive engines
Step 3: Configure Engine Placement
- Deploy engines in appropriate network segments
- Ensure engines can reach scan targets
- Use distributed engines for segmented networks
3. User & Access Management
3.1 Implement Role-Based Access Control
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Configure granular roles for least privilege access.
ClickOps Implementation
Step 1: Review Built-in Roles
- Navigate to: Administration → User Management
- Review available roles:
- Global Administrator: Full platform access
- Asset Owner: View assigned assets
- User: Standard scanning capabilities
- Security Manager: Security configuration
Step 2: Create Custom Roles
- Navigate to: Administration → Roles
- Click Create Role
- Configure permissions:
- Site access
- Scan management
- Report access
- Configuration rights
Step 3: Assign Minimum Required Roles
- Limit Global Administrator to 2-3 users
- Use custom roles for specific functions
- Document role assignments
3.2 Manage Administrator Accounts
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6(1) |
Description
Protect and limit administrator account access.
Rationale
Why This Matters:
- Admin accounts can modify all configurations
- Compromised admin access exposes vulnerability data
- Minimize admin accounts to reduce risk
ClickOps Implementation
Step 1: Inventory Admin Accounts
- Navigate to: Administration → User Management
- Filter by administrator roles
- Document all admin accounts
Step 2: Apply Least Privilege
- Remove unnecessary admin access
- Create separate accounts for admin vs. daily tasks
- Review quarterly
Step 3: Protect Admin Credentials
- Use strong, unique passwords (20+ characters)
- Store in password vault
- Enable MFA for all admins
3.3 Configure Audit Logging
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 8.2 |
| NIST 800-53 | AU-2 |
Description
Enable and monitor audit logs for security events.
ClickOps Implementation
Step 1: Access Audit Logs
- Navigate to: Administration → Audit Log
- Review logged events:
- User logins
- Configuration changes
- Scan activities
- Report generation
Step 2: Configure Log Retention
- Set retention period (minimum 90 days)
- Export logs for long-term storage
- Integrate with SIEM
Step 3: Monitor Key Events
- Admin login events
- User provisioning/deprovisioning
- Role modifications
- Console configuration changes
4. Monitoring & Compliance
4.1 Configure Vulnerability Scanning Security
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 7.1 |
| NIST 800-53 | RA-5 |
Description
Secure vulnerability scanning configurations.
ClickOps Implementation
Step 1: Secure Scan Credentials
- Navigate to: Administration → Shared Credentials
- Use least privilege for scan accounts
- Never use domain admin credentials
Step 2: Configure Credential Vault Integration
- Integrate with CyberArk or HashiCorp Vault
- Retrieve credentials dynamically
- Rotate credentials regularly
Step 3: Protect Credential Storage
- Rapid7 encrypts stored credentials
- Limit who can view/edit credentials
- Audit credential access
4.2 Configure Compliance Assessment
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 4.1 |
| NIST 800-53 | CM-6 |
Description
Enable policy compliance scanning for hardening verification.
ClickOps Implementation
Step 1: Configure Policy Scans
- Navigate to: Policies → Create Policy
- Select compliance framework:
- CIS Benchmarks
- DISA STIGs
- Custom policies
Step 2: Schedule Assessments
- Configure scan schedules
- Target appropriate assets
- Set up notifications
Step 3: Track Remediation
- Review compliance results
- Assign remediation tasks
- Monitor improvement trends
4.3 Configure InsightIDR Integration
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 8.2 |
| NIST 800-53 | SI-4 |
Description
Integrate InsightVM with InsightIDR for security monitoring.
ClickOps Implementation
Step 1: Enable Platform Integration
- Both products use Command Platform
- Data automatically shared
- Verify integration status
Step 2: Configure Alerts
- Set up alerts for critical vulnerabilities
- Configure detection rules
- Enable automated responses
5. Compliance Quick Reference
SOC 2 Trust Services Criteria Mapping
| Control ID | Rapid7 Control | Guide Section |
|---|---|---|
| CC6.1 | SSO/MFA | 1.1 |
| CC6.2 | RBAC | 3.1 |
| CC6.6 | Console security | 2.1 |
| CC7.1 | Vulnerability scanning | 4.1 |
| CC7.2 | Audit logging | 3.3 |
NIST 800-53 Rev 5 Mapping
| Control | Rapid7 Control | Guide Section |
|---|---|---|
| IA-2 | SSO | 1.1 |
| IA-2(1) | MFA | 1.3 |
| AC-6 | Least privilege | 3.1 |
| RA-5 | Vulnerability scanning | 4.1 |
| CM-6 | Compliance assessment | 4.2 |
Appendix A: References
Official Rapid7 Documentation:
- Rapid7 Documentation
- Configure SSO access to InsightVM Security Console
- Configure SSO for Command Platform
- Configure Azure as SAML source
- Troubleshooting SAML SSO
- Security Console Best Practices
API & Developer Resources:
Trust & Compliance:
- Rapid7 Trust Center
- Rapid7 Compliance
- SOC 2 Type II, ISO 27001 – via Rapid7 Trust Center
Security Incidents:
- Codecov Supply Chain Breach (2021): Attackers accessed a small subset of Rapid7 source code repositories via a compromised Codecov Bash Uploader. Some internal credentials and alert-related data for a subset of MDR customers were exposed. No direct breach of Rapid7 infrastructure in 2024-2025 has been publicly reported.
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-02-05 | 0.1.0 | draft | Initial guide with SSO, console security, and user management | Claude Code (Opus 4.5) |
Contributing
Found an issue or want to improve this guide?
- Report outdated information: Open an issue with tag
content-outdated - Propose new controls: Open an issue with tag
new-control - Submit improvements: See Contributing Guide