CISA KEV
Keep your systems secure and up-to-date with the latest KEV (Known Exploited Vulnerabilities) information from the CISA (Cybersecurity & Infrastructure Security Agency) catalog.
Overview
Using the CISA KEV enrichment connector, organizations can easily enrich their finding data with valuable information from the KEV database. This data includes details on the software flaws that have been exposed and leveraged by attackers, such as vulnerability severity, impact, and mitigation, enabling organizations to better understand and prioritize the risks associated with these weaknesses.
How it works
The CISA KEV enrichment connector is straightforward to use. Simply log into your Monad account and select the CISA input connector (it does not require any credentials). There is also a configuration option to export to a warehouse, creating its own table for cisa_kev_vulnerability vulnerabilities. Detailed instructions can be found on our documentation page.
Learn more
Learn more about CISA’s Known Exploited Vulnerabilities Catalog.