Introducing Connectors

Seamlessly connect DefectDojo to your security tools suite

Updated over a week ago

DefectDojo allows users to build sophisticated API integrations, and gives users full control over how their vulnerability data is organized.

But everyone needs a starting point, and that's where Connectors come in. Connectors are designed to get your security tools connected and importing data to DefectDojo as quickly as possible.

We currently support connectors for the following tools, with more on the way:

  • AWS Security Hub

  • BurpSuite

  • Semgrep

  • Snyk

Connectors Quick-Start

If you're using DefectDojo's Auto-Map settings, you can have your first Connector up and running in no time.

  1. Set up a Connector from a supported tool.

  2. Discover your tool's data hierarchy.

  3. Sync the vulnerabilities found with your tool into DefectDojo.

That's all, really! And remember, even if you create your Connector the 'easy' way, you can easily change the way things are set up later, without losing any of your work.

How Connectors Work

As long as you have the API key from the tool you're trying to connect, a connector can be added in just a few minutes. Once the connection is working, DefectDojo will Discover your tool's environment to see how you're organizing your scan data.

Let's say you have a BurpSuite tool, which is set up to scan five different repositories for vulnerabilities. Your Connector will take note of this organizational structure and set up Records to help you translate those separate repositories into DefectDojo's Product / Engagement / Test hierarchy. If you have 'Auto-Map Records' enabled, DefectDojo will learn and copy that structure automatically.

Once your Record mappings are set up, DefectDojo will start importing scan data on a regular basis. You'll be kept up to date on any new vulnerabilities detected by the tool, and you can start working with existing vulnerabilities immediately, using DefectDojo's Findings system.

When you're ready to add more tools to DefectDojo, you can easily rearrange your import mappings to something else. Multiple tools can be set up to import vulnerabilities to the same destination, and you can always reorganize your setup for a better fit without losing any work.

Next Steps

Did this answer your question?