CISA Known Exploited Vulnerabilities (KEV)
CISA (Cybersecurity & Infrastructure Security Agency) identifies threats and known exploited vulnerabilities. You can bring these findings into Brinqa to construct a unified view of your attack surface and strengthen your cybersecurity posture.
This document details the information you must provide for the connector to authenticate with CISA and how to obtain that information from CISA. See create a data integration for step-by-step instructions on setting up the integration.
Required connection settings
When setting up a data integration, select CISA Known Exploited Vulnerabilities from the Connector drop-down. If you cannot find the connector in the drop-down, make sure that you have installed it first. You must provide the following information to integrate CISA KEV with Brinqa:
- CISA URL: The base URL for the CISA KEV data feeds. The default URL is
https://www.cisa.gov
.
Types of data to retrieve
The CISA KEV connector can retrieve the following types of data from CISA:
Connector Object | Required | Maps to Data Model |
---|---|---|
Exploited Vulnerability | Yes | CVE record |
The CISA KEV connector does not currently support operation options for the types of data it retrieves.
For detailed steps on how to view the data retrieved from CISA in the Brinqa Platform, see How to view your data.
Data feeds path
The CISA KEV connector downloads the latest data feeds from the following path:
Changelog
The CISA KEV connector has undergone the following changes:
3.0.5
- Updated dependencies.
3.0.4
- Updated dependencies.
3.0.3
- Updated the DATE_ADDED attribute to Instance class from Long.
3.0.2
- Upgraded to the latest Connector Framework.
3.0.1
- Updated the UID mappings.
3.0.0
- Initial Integration+ release.