Vulnerabilities
Learn how Sprinto helps monitor, resolve, and document vulnerabilities across your infrastructure and codebase for seamless compliance.
The Vulnerabilities section in Sprinto helps you continuously track and manage security flaws across your cloud infrastructure, code repositories, and integrated tools. It acts as a central hub that pulls in vulnerability logs from connected monitoring sources like AWS Inspector, GitLab, Snyk, Google Security Center, SonarCloud, and more.
This area enables security teams to:
View real-time vulnerability alerts from all integrated scanners.
Track open, resolved, or overdue vulnerabilities against defined SLA timelines.
Manually upload pentest findings and resolve vulnerabilities as needed.
Add periodic workflow checks to satisfy framework-specific controls when integrations are not available.
Where to find it?
To access this section:
Log in to the Sprinto dashboard.
Go to Data Library > Vulnerabilities.
You will land on the Overview tab, where all integrated monitoring sources are listed, alongside their compliance-mapped frameworks and open issue counts.
Key Capabilities
Native Integrations: Connect with leading vulnerability scanners for infrastructure and code security. For example, Snyk, AWS Inspector, Google Security Center, and more.
Pentest Uploads: Import vulnerabilities found during certified penetration tests—individually or in bulk—alongside the official VPAT report.
SLA Monitoring: Automatically flag issues that miss resolution deadlines. Each vulnerability is tagged with severity, status, and assignee.
Special Case Handling: Mark specific vulnerabilities as out-of-scope or under extension with justification and expiry.
Workflow Checks: Add manual checks (e.g., for bias testing, AI system scans, red teaming) to meet framework requirements not covered via integrations.
Types of Monitoring Sources
Infrastructure
AWS Inspector, Google Security Center
Scans your cloud infrastructure and services.
Codebase
GitLab, SLScan, Dependabot, Snyk
Detects issues in application code and third-party libraries.
Endpoints
CrowdStrike Spotlight
Detects endpoint vulnerabilities (e.g., user devices).
Ticketing/Tracking
Jira
Centralises remediation workflow across all sources.
Mapped Frameworks
Sprinto maps vulnerabilities to frameworks such as:
PCI DSS
SOC 2
ISO 27001
GDPR
CPRA
NIST 800-53
Mapped control IDs (e.g., SDC 55, SDC 56, SDC 63) are displayed in the sidebar and next to each integration.
Example View
From the Overview tab, you can:
View all integrated monitoring sources.
Check the number of open vulnerabilities.
View associated controls for compliance mapping.
Add new workflow checks or monitoring sources.
View integration issues (if any).
Last updated