Integrations
Connect external services to enhance your security workflow and automatically export your scan results. Configure integrations in Settings > Integrations — most require only an API key or webhook URL and are active within minutes.
SIEM & Security Hub
Send findings to security information and event management platforms for centralized monitoring and threat detection.
Send security findings to AWS Security Hub.
Automatically forward CloudSignals+RiskOps findings to AWS Security Hub for centralized monitoring across your AWS environment. Findings are mapped to the AWS Security Finding Format (ASFF) and appear alongside native AWS checks, enabling unified visibility and workflow automation via Security Hub rules.
Send findings to Microsoft Sentinel SIEM.
Integrate with Microsoft Sentinel to automatically send security findings to your Azure Log Analytics workspace. Findings are ingested via the AiVRIC Sentinel data connector and surfaced as Security Alerts, with pre-built analytic rules and workbooks for threat detection, investigation, and response workflows.
Send findings to Elastic Security for centralized SIEM analysis.
Configure the Elastic Security integration to automatically send findings in Elastic Common Schema (ECS) format to your Elastic Stack. Enables ML-powered threat detection, cross-source correlation, and pre-built dashboards within Elastic Security for unified visibility across cloud and on-premises infrastructure.
Send findings to Splunk Enterprise Security.
Integrate with Splunk Enterprise Security via HTTP Event Collector (HEC) to stream security findings in real time. Enables alerting, correlation searches, and dashboards within Splunk ES — pre-built AiVRIC searches are included. Configure the HEC endpoint URL and token in Settings > Integrations > Splunk.
Ticketing & Incident Management
Create tickets and incidents for security findings to track remediation through your existing workflows.
Create and manage security issues in Jira.
Automatically create Jira issues for security findings in your Jira projects. Map AiVRIC severity levels to Jira priority and issue type, assign issues to owners, and sync remediation status back to AiVRIC when issues are resolved. Supports Jira Cloud and Jira Data Center via OAuth or API token.
Create security incidents in ServiceNow SIR.
Integrate with ServiceNow Security Incident Response (SIR) to automatically create and track security incidents from CloudSignals+RiskOps findings. Bidirectional status sync keeps AiVRIC and ServiceNow in lockstep throughout the remediation lifecycle, enabling streamlined vulnerability management and audit-ready evidence.
Create incidents for critical security findings.
Integrate with PagerDuty to automatically create incidents for Critical and High severity findings, ensuring immediate on-call notification and rapid response. Map AiVRIC severity levels to PagerDuty escalation policies and service routing rules. Configure in Settings > Integrations > PagerDuty using your service integration key.
Endpoint Security
Enrich endpoint security platforms with cloud infrastructure findings for unified threat detection.
Send findings to SentinelOne Singularity.
Integrate with the SentinelOne Singularity platform to enrich your endpoint security posture with cloud infrastructure findings from CloudSignals+RiskOps. Enables unified threat detection and automated response across your entire environment — correlating cloud misconfigurations with endpoint telemetry for faster, more contextual investigation.
Notifications
Send real-time alerts and summaries to team collaboration platforms for immediate visibility.
Send security alerts to Teams channels.
Integrate with Microsoft Teams to send scan summaries and critical security findings directly to your team channels for immediate visibility and collaboration. Alerts are delivered as adaptive cards with finding details and direct links back into the AiVRIC dashboard. Map different severity levels or workspaces to different channels.
Send security alerts to Slack channels.
Integrate with Slack to send scan summaries and critical security findings directly to your team channels for immediate visibility and collaboration. Install the AiVRIC Slack app and map channels to severity levels, workspaces, or compliance frameworks. Supports real-time per-finding alerts and scheduled daily or weekly digests.
Storage
Export scan results and findings to cloud storage for archival, long-term retention, and downstream analysis.
Export security findings to Amazon S3 buckets.
Automatically export CloudSignals+RiskOps security findings to your S3 buckets in JSON or CSV format. Configure export frequency, bucket name, prefix path, and optional KMS encryption key in Settings > Integrations > Amazon S3. Exports can feed downstream tools such as Athena, Glue, or third-party GRC platforms.
Export security findings to Azure Blob Storage containers.
Automatically export security findings to your Azure Blob Storage containers. Configure the storage account, container name, optional folder prefix, and SAS token or service principal credentials in Settings > Integrations > Azure Blob Storage. Supports integration with Azure Data Factory and Microsoft Purview for downstream governance workflows.
Export security findings to Google Cloud Storage buckets.
Automatically export security findings to your GCS buckets in JSON or CSV format. Configure the bucket name, object prefix, export frequency, and HMAC or service account credentials in Settings > Integrations > Google Cloud Storage. Exported data can feed BigQuery, Dataflow, or third-party analytics pipelines for trend analysis and reporting.