Intruder Integration
Intruder is a vulnerability management solution that gives a real-time view of attack surfaces through continuous network monitoring, automated vulnerability scanning, and proactive threat response in a single platform.
How does this integration help Sprinto
The integration below assists Sprinto in meeting compliance requirements concerning vulnerability monitoring on production classified code repositories. Sprinto detects vulnerabilities from your configured Intruder account and ensures they are resolved within the defined SLA (Service Level Agreement) with the assistance of Sprinto's checks.
Sprinto checks for Intruder integration
Following are the Sprinto checks available for Intruder integration:
Sprinto check
Required action
Intruder vulnerability alert should be resolved within SLA
This check activates when Sprinto detects a vulnerability in the open status on your configured Intruder account. To fix this check, resolve the detected vulnerability from the source.
Before your begin
Ensure you have “Admin” access on the Intruder account you wish to integrate on Sprinto.
Log in on Sprinto as administrator.
Integrate Sprinto with Intruder
Follow the below steps to integrate Sprinto with Intruder:
the Get API Key from the Intruder account.
Log in to your Intruder account using your credentials or available Single Sign-On (SSO) options.
Go to Settings > API Access Token, and click + Create Access Token.
Enter the Token name, description, and expiry, then click Save.
Copy the generated API key and save it securely. We will need this API key on Sprinto to build the integration.
Integrate Intrduder on Sprinto.
Go to Security Hub > Settings > Integrations > Available, and click Connect next to Intruder.
Read the on-screen instructions, and click Next.
Enter the API Key copied from Step 1, and click Connect. Note: Ensure you have a pop-up window enabled on your web browser.
Add Intruder as a vulnerability monitoring source.
Go to Security Hub > Vulnerabilities > Overview, and click + Add Monitoring Source.
On Add Vulnerability monitoring source page, click Choose next to Intruder.
Click Add Intruder from the configuration page.
After completing Step 2, allow 15 to 20 minutes for Sprinto to finish the data syncing process. Sprinto may take a few hours to evaluate the synced data and activate relevant Sprinto checks. If needed, go to Security Hub > Vulnerabilities and click Intruder to review the pending Sprinto checks.
If you need any assistance with the integration, kindly get in touch with Sprinto support.
Last updated