Integrations
SecurityScorecard connector
Ingest external signals and trigger threat correlation actions using scoped connector installations and rules.
Connector security model
Connector credentials are handled as sensitive configuration, connector execution is tenant-scoped, and imported signals are mapped into the owning tenant context before downstream actions are allowed.