Security teams struggle with data scattered across dozens of tools, lacking the integrations, technology, and processes to bring it together in a reliable and seamless fashion.
his month’s release brings security teams closer to overcoming these challenges with Secrets Management for centralized credential handling, OCSF Transformation Support [Beta] for standardized security data transformations, and new integrations that enhance visibility across IAM, cloud, and critical SaaS apps.
🪄Introducing Secrets Management
Managing credentials across pipelines and integrations has traditionally been tedious and error-prone, requiring manual updates, duplication, and constant re-entry. Our new Secrets Management capability eliminates these inefficiencies while enhancing security and usability by centralizing secret handling.
With this feature, secrets can be referenced by name and securely shared across multiple components, ensuring a single update applies everywhere—eliminating the risk of outdated or misconfigured credentials. Because secrets are no longer embedded in individual components, exposure is reduced, lowering the risk of leaks or mismanagement. This also enables seamless duplication of pipelines and components (inputs, outputs, routes, and transforms), allowing teams to iterate and deploy faster while minimizing human error.
Key benefits
- Centralized secret management – Update once, apply everywhere automatically, reducing drift and misconfiguration.
- Reduced credential exposure – Secrets are securely referenced rather than stored in multiple locations.
- Faster, safer testing and deployment – Clone pipelines without re-entering secrets, ensuring consistency across environments.
- Seamless production rollouts – Confidently move from staging to production without peace of mind.
This new capability strengthens security while improving efficiency, making it easier than ever to manage secrets at scale.
OCSF Support
Security teams are constantly dealing with fragmented data formats across multiple security tools. That’s why we’re rolling out beta support for the Open Cybersecurity Schema Framework (OCSF))—a leading security data standardization framework.
Rather than relying on manual mapping, parsing, and tedious scripting, you can now transform raw security data into OCSF using our JQ transformation capabilities.
Today, we have OCSF support for the following integrations:
- CrowdStrike: Convert CrowdStrike data (endpoints, workloads, identity) into OCSF. This enables unified threat detection and SIEM integration for faster response.
- Tenable: Transform Tenable vulnerability data into OCSF. Use this for centralized logging, compliance, and risk assessment across IT, OT, and cloud.
- Okta: Standardize Okta identity logs (auth, authorization, changes) into OCSF. Apply this for consistent querying, audits, and incident response.
- Wiz: Map Wiz cloud findings (vulnerabilities, misconfigs) into OCSF. Use this for normalized cloud security posture management and broader data lake integration.
The OCSF beta is live while we continue refining the feature based on your feedback to ensure optimal performance and functionality before full general availability (GA). Want to take it for a spin? Reach out to us at product@monad.com and we’ll set you up with an account!
New Integrations
This month, we’ve added eight new integrations, with a focus on Identity & Access Management (IAM), cloud and SaaS security.
Identity & Access Management (IAM)
- Box Users – Access user profiles and permissions to analyze roles, track access changes, and improve identity management.
- Jira Roles – Pull role-based data from Jira to automate security workflows and align DevSecOps teams.
- Jira Users – Ingest user activity logs to track ticket handling and security incident workflows.
- Slack Users – Monitor Slack user activity for behavior tracking, anomaly detection, and identity security.
- Slack Groups – Integrate group membership data to detect risks in collaboration platforms and strengthen security monitoring.
Cloud & SaaS Security
- Box Events – Ingest real-time activity logs to monitor file access, detect unauthorized sharing, and ensure compliance.
- Google Cloud Asset Inventory – Ingest asset metadata (VMs, databases, configurations) for cloud security posture assessment.
- Wiz Issues – Pull security findings (vulnerabilities, misconfigurations) for prioritizing remediation and enhancing cloud threat detection.
These integrations enable ingesting data from key IAM, SaaS and cloud security tools making it easier to track access, detect anomalies, and secure your environments.
If you need additional integrations, reach out at product@monad.com or submit requests via our Integrations page.
Looking Ahead
Security teams deserve tools that simplify complexity, scale effortlessly, and keep their org secure—exactly what this month’s release delivers. With Secrets Management, OCSF Transformation Support [Beta], and our expanded integrations, you’re now equipped to manage data pipelines with even more efficiency, visibility, and peace of mind.
Ready to transform how your team handles security data? Reach out at product@monad.com to request a demo!