Asana Integration with Grip Security - Posture (SSPM)

Prev

Overview

This guide outlines how to integrate Asana with Grip Security, allowing Grip Security to assess key security configurations related to access control, data loss prevention, and more within your Asana environment.

Prerequisites

You need to have an “asana developer” access

Create a new SSPM app in Asana

From app.asana.com/0/my-apps, go to “Create new app(1)

  • Give the app a name (2)

  • Select the following options:

    • Integrate Asana and another tool(3)

    • I agree to the Asana API Terms(4)

  • Click on “Create app.”

Copy the “Client ID” and “Client Secret(5) as you will need them when integrating with Grip.

  • From the side navigation, go to “OAuth(6)

  • Click on “+Add Redirect URL(7) - Enter your Grip domain name after the “https://.”  
    https://{client_domain_in_grip}.integrations.grip.security/oauth/callback (8).
    For example, in this URL, https://acme.dep.grip.security/ the {client_domain_in_grip} will be, acme.

  • Scroll down and enable the “Full permission” toggle (9)

  • Click “Save changes.”

  • From the side navigation, go to “Manage distribution(10)

  • Choose the “Specific workspace” distribution method and click  on “+Add workspace” (11)

  • Select “grip security” (12) and click on “Add.”

Connect Asana to Grip SSPM

From Grip platform, go to Posture >> Click on “Add Tenant” (1) >> “Asana (2)

  • Enter the tenant details: the Name, Client ID, and Client Secret you copied in the previous step.

  • Click “Continue.”

  • The “Connect Asana” window (4) indicates that to complete the integration, you need to sign in to Asana with your username and password or send a URL to Asana’s admin.

  • If you lack the necessary permissions, copy the link and share it with the Asana admin. Once the admin approves it, the tenant will be connected.  
    Note that the link expires after 1 hour.

  • If you have the admin's username and password, log in to Asana (5).

  • Once connected, the Tenant will be added to the “Connected Tenants” list (6). There, you can view and filter your policy statuses, evaluate your security posture, and start addressing issues.