Integrations

SecurityScorecard connector

Ingest external signals and trigger threat correlation actions using scoped connector installations and rules.

Connector security model

Connector credentials are handled as sensitive configuration, connector execution is tenant-scoped, and imported signals are mapped into the owning tenant context before downstream actions are allowed.