Set Up Vulnerability Monitoring Source

Learn how to connect your infrastructure or codebase scanners to Sprinto to automatically detect and track vulnerabilities.

You can integrate Sprinto with widely used vulnerability monitoring tools to automate detection and tracking of security flaws across your infrastructure and application code.

Once connected, Sprinto retrieves vulnerability logs from the configured source and automatically triggers system-status checks mapped to compliance frameworks.


📌 Before You Begin

Ensure the following:

  • You have administrator access to the Sprinto dashboard.

  • You have administrator or integration-level permissions on the monitoring source (e.g. AWS, GitLab, Snyk).

  • Your desired source is supported by Sprinto (see list below).


Supported Monitoring Sources

Sprinto supports integrations across:

Category
Examples

Infrastructure

AWS Inspector, Google Security Center

Codebase

GitLab, Dependabot, SLSCan, Snyk, SonarCloud

Endpoints

CrowdStrike Spotlight, Microsoft Defender for Endpoints

Ticketing

Jira

If your service is not supported, you can instead configure manual workflow checks. See: Create and Manage Workflow Checks.


Procedure

To connect a new vulnerability monitoring source:

  1. Go to Data Library > Vulnerabilities.

  2. Click + Add monitoring source.

  3. In the pop-up, browse or search the available services (e.g. GitLab, AWS Inspector).

  4. Click Choose next to the service you want to add.

  5. Follow the onscreen instructions to authenticate and configure the integration.

    • For example, when configuring Jira, Sprinto will:

      • Run checks across all tracked projects.

      • Continuously track vulnerabilities.

      • Monitor SLA compliance for issue closures.

  6. Once successfully connected, you’ll see the service listed on the Overview tab with open vulnerabilities (if any) and associated compliance controls.


Troubleshooting

If you see an Issues detected in Integrations banner, this means Sprinto has detected sync or credential errors in one or more sources.

  • Click View and Fix to go to the Integrations page.

  • Follow the prompts to reauthenticate or reconfigure the affected integration.


Result

Your monitoring source is now active. Sprinto will begin fetching vulnerability logs and activating system-status checks as per your compliance setup.

You can now:

  • View vulnerabilities under each service tab (e.g. Google Security Center).

  • Track severity, assigned owner, and due dates.

  • Trigger remediation workflows based on the source findings.

Last updated