

# Manage findings in existing tools and workflows
<a name="existing-tools"></a>

We recommend additional Security Hub CSPM integrations for enterprise organizations that have established tools that teams use to manage or perform their daily tasks. You can import Security Hub CSPM finding data into several technology platforms. Examples include:
+ [Security information and event management (SIEM) systems](apg-gloss.md#glossary-siem) help security teams triage operational security events. SIEM systems provide real-time analysis of security alerts that are generated by applications and network hardware.
+ [Governance, risk, and compliance (GRC)](https://aws.amazon.com/what-is/grc/) systems help compliance and governance teams monitor and report on risk management data. GRC tools are software applications that businesses can use to manage policies, assess risk, control user access, and streamline compliance. You might use GRC tools to integrate business processes, reduce costs, and improve efficiency.
+ Product backlog and ticketing systems help application and cloud teams manage features and prioritize development tasks. [https://www.atlassian.com/software/jira](https://www.atlassian.com/software/jira) and [https://learn.microsoft.com/en-us/azure/devops/user-guide/what-is-azure-devops](https://learn.microsoft.com/en-us/azure/devops/user-guide/what-is-azure-devops) are examples of these systems.

Integrating Security Hub CSPM findings directly with these existing enterprise systems can improve mean time to recovery (MTTR) and security outcomes because the daily operational workflow doesn't have to change. Teams can respond and learn from security findings much faster because they don't have to use separate workflows and tools. Integration makes addressing security findings part of the normal, standard workflow.

Security Hub CSPM integrates with multiple third-party partner products. For a complete list and instructions, see [Available third-party partner product integrations](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-partner-providers.html) in the Security Hub CSPM documentation. Common integrations include [https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-partner-providers.html#integration-atlassian-jira-service-management](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-partner-providers.html#integration-atlassian-jira-service-management), [Bidirectionally integrate AWS Security Hub CSPM with Jira software](https://docs.aws.amazon.com/prescriptive-guidance/latest/patterns/bidirectionally-integrate-aws-security-hub-with-jira-software.html), and [https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-partner-providers.html#integration-servicenow-itsm](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-partner-providers.html#integration-servicenow-itsm). The following diagram shows how you can configure Amazon Inspector to send findings to Security Hub CSPM and then configure Security Hub CSPM to send all findings to Jira.



![\[Send Amazon Inspector and AWS Security Hub CSPM findings to Jira\]](http://docs.aws.amazon.com/prescriptive-guidance/latest/vulnerability-management/images/jira-integration-security-hub.png)
