

# Integrations with Security Lake
<a name="integrations-overview"></a>

Amazon Security Lake integrates with other AWS services and third-party products. Integrations can send data to Security Lake as a source or consume data in Security Lake as a subscriber. The following topics explain which AWS services and third-party products integrate with Security Lake.

**Topics**
+ [AWS service integrations with Security Lake](aws-integrations.md)
+ [Third-party integrations with Security Lake](integrations-third-party.md)

# AWS service integrations with Security Lake
<a name="aws-integrations"></a>

Amazon Security Lake integrates with other AWS services. A service may either operate as a *source integration*, a *subscriber integration*, or both.

Source integrations have the following properties:
+ Send data to Security Lake
+ Data arrives in the [Open Cybersecurity Schema Framework (OCSF) in Security Lake](open-cybersecurity-schema-framework.md) schema
+ Data arrives in Apache Parquet format

Subscriber integrations can access Security Lake data in one of the following ways:
+ Read source data from Security Lake through an HTTPS endpoint
+ Read source data from Security Lake through an Amazon Simple Queue Service (Amazon SQS)
+ By directly querying source data using AWS Lake Formation

The following table provides a list of AWS service integrations that Security Lake supports.


| AWS service | Integration type | Description | How integration works | 
| --- | --- | --- | --- | 
|  [Amazon Bedrock](https://docs.aws.amazon.com/bedrock/latest/userguide/what-is-bedrock.html)  |  Subscriber  |  Generate AI-powered insights to analyze Security Lake data.  |  [Amazon Bedrock integration](bedrock-integration.md)  | 
|  [Amazon Detective](https://docs.aws.amazon.com/detective/latest/userguide/what-is-detective.html)   |  Subscriber  |  Analyze, investigate, and quickly identify the root cause of security findings or suspicious activities by querying Security Lake.  |  [Amazon Detective integration](detective-integration.md)  | 
|  [Amazon OpenSearch Service](https://docs.aws.amazon.com/opensearch-service/latest/developerguide/what-is.html)   |  Subscriber  |  Generate security insights from Security Lake data by using OpenSearch Service ingestion.  |  [Amazon OpenSearch Service integration](opensearch-integration.md)  | 
|  [Amazon OpenSearch Service ingestion pipeline](https://docs.aws.amazon.com/opensearch-service/latest/developerguide/ingestion.html)   |  Subscriber, Source  |  Stream logs, metrics, and trace data to OpenSearch Service and Security Lake.  |  [Amazon OpenSearch Service Ingestion pipeline integration](opensearch-ingestion-pipeline-integration.md)  | 
|  [Amazon OpenSearch Service zero-ETL](https://docs.aws.amazon.com/opensearch-service/latest/developerguide/direct-query.html)   |  Subscriber (Query)  |  Query data in Security Lake with zero-ETL.  |  [Amazon OpenSearch Service zero-ETL direct query integration](opensearch-datasource-integration.md)  | 
|  [Quick](https://docs.aws.amazon.com/quicksight/latest/user/welcome.html)   |  Subscriber  |  Visualize, explore, and interpret logs in Security Lake with Quick.  |  [Quick integration](quicksight-integration.md)  | 
|  [Amazon SageMaker AI](https://docs.aws.amazon.com/sagemaker/latest/dg/whatis.html)   |  Subscriber  |  Generate AI-powered insights to analyze Security Lake data.  |  [Amazon SageMaker AI integration](sagemaker-integration.md)  | 
|  [AWS AppFabric](https://docs.aws.amazon.com/appfabric/latest/adminguide/what-is-appfabric.html)   |  Source  |  Ingests and normalize software as a service (SaaS) application logs into Security Lake standard format.  |  [AWS AppFabric integration](appfabric-integration.md)  | 
|  [AWS Security Hub CSPM](https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html)   |  Source  |  Centralize and store security findings from Security Hub CSPM in Security Lake standard format.  |  [AWS Security Hub CSPM integration](securityhub-integration.md)  | 

# Integration with Amazon Bedrock
<a name="bedrock-integration"></a>

[Amazon Bedrock](https://docs.aws.amazon.com//bedrock/latest/userguide/what-is-bedrock.html) is a fully managed service that makes high-performing foundation models (FMs) from leading AI startups and Amazon available for your use through a unified API. With Amazon Bedrock's serverless experience, you can get started quickly, privately customize foundation models with your own data, and easily and securely integrate and deploy them into your applications using AWS tools without having to manage any infrastructure.

## Generative AI
<a name="bedrock-integration-generative-ai"></a>

You can use the generative AI capabilities of Amazon Bedrock and natural language input in SageMaker AI Studio to analyze data in Security Lake and work towards reducing your organization’s risk and increase your security posture. You can reduce the amount of time needed to conduct an investigation by automatically identifying the appropriate data sources, generating and invoking SQL queries, and visualizing data from your investigation. For more details see [Generate AI powered insights for Amazon Security Lake using Amazon SageMaker AI Studio and Amazon Bedrock](https://aws.amazon.com/blogs//security/generate-ai-powered-insights-for-amazon-security-lake-using-amazon-sagemaker-studio-and-amazon-bedrock/).

# Integration with Amazon Detective
<a name="detective-integration"></a>

**Integration type:** Subscriber

[Amazon Detective](https://docs.aws.amazon.com//detective/latest/adminguide/what-is-detective.html) helps you analyze, investigate, and quickly identify the root cause of security findings or suspicious activities. Detective automatically collects log data from your AWS resources. It then uses machine learning, statistical analysis, and graph theory to generate visualizations that help you to conduct faster and more efficient security investigations. The Detective prebuilt data aggregations, summaries, and context help you to quickly analyze and determine the nature and extent of possible security issues.

When you integrate Security Lake and Detective, you can query the raw log data stored by Security Lake from Detective. For more information, see [Integration with Amazon Security Lake](https://docs.aws.amazon.com//detective/latest/userguide/securitylake-integration.html).

# Integration with Amazon OpenSearch Service
<a name="opensearch-integration"></a>

**Integration type:** Subscriber

[Amazon OpenSearch Service](https://docs.aws.amazon.com/opensearch-service/latest/developerguide/what-is.html) is a managed service that makes it easy to deploy, operate, and scale OpenSearch Service clusters in the AWS Cloud. Using OpenSearch Service Ingestion to ingest data into your OpenSearch Service cluster, you can derive insights quicker for time sensitive security investigations. You can respond swiftly to security incidents, helping you protect your business critical data and systems.

## OpenSearch Service dashboard
<a name="opensearch-integration-dashboard"></a>

After you integrate OpenSearch Service with Security Lake, you can configure Security Lake to send security data from different sources to OpenSearch Service through serverless OpenSearch Service Ingestion. For more information on how to configure OpenSearch Service ingestion to process security data, see [Generate security insights from Amazon Security Lake data using Amazon OpenSearch Service Ingestion](https://aws.amazon.com/blogs/big-data/generate-security-insights-from-amazon-security-lake-data-using-amazon-opensearch-ingestion/).

After OpenSearch Service Ingestion starts writing your data into your OpenSearch Service domain. To visualize the data using the pre-built dashboards, navigate to dashboards and choose any one of the installed dashboards.

# Integration with Amazon OpenSearch Service Ingestion pipeline
<a name="opensearch-ingestion-pipeline-integration"></a>

**Integration type:**Subscriber, Source

Amazon OpenSearch Service Ingestion is a fully managed, serverless data collector that streams logs, metrics, and trace data to OpenSearch Service and Security Lake.

**Send data to Security Lake using OpenSearch Ingestion pipeline**  
You can use an Amazon Simple Storage Service (Amazon S3) sink plugin in OpenSearch Ingestion to send data from any supported source to Security Lake. Security Lake automatically centralizes security data from AWS environments, on-premises environments, and SaaS providers into a purpose-built data lake. For more information, see [Using an OpenSearch Ingestion pipeline with Amazon Security Lake as a sink](https://docs.aws.amazon.com/opensearch-service/latest/developerguide/configure-client-sink-security-lake.html).

**Send data from Security Lake to OpenSearch using OpenSearch Ingestion pipeline**  
You can use an Amazon S3 source plugin to ingest data into your OpenSearch Ingestion pipeline. For more information, see [Using an OpenSearch Ingestion pipeline with Amazon Security Lake as a source](https://docs.aws.amazon.com/opensearch-service/latest/developerguide/configure-client-source-security-lake.html).

# Integration with Amazon OpenSearch Service zero-ETL direct query
<a name="opensearch-datasource-integration"></a>

**Integration type:** Subscriber (Query)

You can use OpenSearch Service direct query to analyze data in Amazon Security Lake. OpenSearch Service provides zero-ETL integration as a way to directly query your data in Security Lake using OpenSearch SQL or OpenSearch Piped Processing Language (PPL) without incurring the friction of building ingestion pipelines or switching between analytics tools. This approach eliminates the need for data movement or duplication, allowing you to analyze your data where it rests using the Discover experience in OpenSearch Service Dashboards. When you want to switch from querying data at rest to actively monitoring with dashboards, you can build indexed views on your query results and ingest it into an OpenSearch Service index. For more information on direct queries, see [Working with direct queries](https://docs.aws.amazon.com//opensearch-service/latest/developerguide/direct-query-s3.html) in the *Amazon OpenSearch Service Developer Guide*. 

OpenSearch Service uses a OpenSearch Serverless collection to directly query the data in Security Lake and store your indexed views. To do this, you create a data source that enables you to use OpenSearch zero-ETL capabilities on Security Lake data. When you create a data source you can directly search, gain insights from, and analyze data stored in Security Lake. You can accelerate your query performance and use advanced OpenSearch analytics on select Security Lake data sets using on-demand indexing. 
+ For details about creating the OpenSearch Service data source integration, see [Creating an Amazon Security Lake data source integration](https://docs.aws.amazon.com//opensearch-service/latest/developerguide/direct-query-security-lake-creating.html) in the *Amazon OpenSearch Service Developer Guide*.
+ For details about configuring Security Lake data source in OpenSearch Service, see [Configuring a Security Lake data source in OpenSearch Service Dashboards](https://docs.aws.amazon.com//opensearch-service/latest/developerguide/direct-query-security-lake-configure.html) in the *Amazon OpenSearch Service Developer Guide*.

For more information about using OpenSearch Service with Security Lake, use the following resources.
+ [Introducing Amazon OpenSearch Service and Amazon Security Lake integration to simplify security analytics](https://aws.amazon.com/blogs//aws/introducing-amazon-opensearch-service-zero-etl-integration-for-amazon-security-lake/)
+ Introduction to zero-ETL on OpenSearch Service with Amazon Security Lake  
[![AWS Videos](http://img.youtube.com/vi/https://www.youtube.com/embed/1k9ASeoKCus/0.jpg)](http://www.youtube.com/watch?v=https://www.youtube.com/embed/1k9ASeoKCus)

# Integration with Amazon Quick
<a name="quicksight-integration"></a>

**Integration type:** Subscriber

[Amazon Quick](https://docs.aws.amazon.com//quicksight/latest/user/welcome.html) is a cloud-scale business intelligence (BI) service that you can use to deliver easy-to-understand insights to the people who you work with, wherever they are. Quick connects to your data in the cloud and combines data from many different sources. Quick gives decision-makers the opportunity to explore and interpret information in an interactive visual environment. They have secure access to dashboards from any device on your network and from mobile devices.

## Quick dashboard
<a name="quicksight-integration-dashboard"></a>

To visualize your Amazon Security Lake data in Quick, to create the required AWS objects and deploy basic data sources, data sets, analysis, dashboards, and user groups to Quick with respect to Security Lake. For the detailed instructions, see [Integration with Amazon Quick](https://aws.amazon.com/solutions/implementations/security-insights-on-aws/).

For more information about visualizing Security Lake data with Quick, see the following resources.

[![AWS Videos](http://img.youtube.com/vi/https://www.youtube.com/embed/vxvMHnfCCGw/0.jpg)](http://www.youtube.com/watch?v=https://www.youtube.com/embed/vxvMHnfCCGw)


[![AWS Videos](http://img.youtube.com/vi/https://www.youtube.com/embed/qPYOsMsHDEM/0.jpg)](http://www.youtube.com/watch?v=https://www.youtube.com/embed/qPYOsMsHDEM)


# Integration with Amazon SageMaker AI
<a name="sagemaker-integration"></a>

**Integration type:** Subscriber

[Amazon SageMaker AI](https://docs.aws.amazon.com//sagemaker/latest/dg/whatis.html) is a fully managed machine learning (ML) service. With Security Lake, data scientists and developers can quickly and confidently build, train, and deploy ML models into a production-ready hosted environment. It provides a UI experience for running ML workflows that makes SageMaker AI ML tools available across multiple integrated development environments (IDEs).

## SageMaker AI insights
<a name="sagemaker-integration-insights"></a>

You can generate machine learning insights for Security Lake by using SageMaker AI Studio. This Studio is a web integrated development environment (IDE) for machine learning that provides tools for data scientists to prepare, build, train, and deploy machine learning models. With this solution, you can quickly deploy a base set of Python notebooks focusing on [AWS Security Hub CSPM](https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html) findings in Security Lake, which can also be expanded to incorporate other AWS sources or custom data sources in Security Lake. For more details, see [Generate machine learning insights for Amazon Security Lake data using Amazon SageMaker AI](https://aws.amazon.com/blogs//security/generate-machine-learning-insights-for-amazon-security-lake-data-using-amazon-sagemaker/).

# Integration with AWS AppFabric
<a name="appfabric-integration"></a>

**Integration type:** Source

[AWS AppFabric](https://docs.aws.amazon.com/appfabric/latest/adminguide/what-is-appfabric.html) is a no-code service that connects software as a service (SaaS) applications across your organization, so IT and security applications using a standard schema and central repository.

## How Security Lake receives AppFabric findings
<a name="appfabric-integration-sending-findings"></a>

You can send AppFabric audit log data to Security Lake by selecting Amazon Kinesis Data Firehose as a destination and configuring Kinesis Data Firehose to deliver data in OCSF schema and Apache Parquet format to Security Lake.

## Prerequisites
<a name="appfabric-integration-prerequisites"></a>

Before you can send AppFabric audit logs to Security Lake, you must output your OCSF normalized audit logs to a Kinesis Data Firehose stream. You can then configure Kinesis Data Firehose to send the output to your Security Lake Amazon S3 bucket. For more information, see [Choose Amazon S3 for your destination ](https://docs.aws.amazon.com/firehose/latest/dev/create-destination.html#create-destination-s3) in the *Amazon Kinesis Developer Guide*.

## Send your AppFabric findings to Security Lake
<a name="send-appfabric-findings"></a>

To send AppFabric audit logs to Security Lake after completing the preceding prerequisite, you must enable both services and add AppFabric as a custom source in Security Lake. For instructions on adding a custom source, see [Collecting data from custom sources in Security Lake](custom-sources.md).

## Stop receiving AppFabric logs in Security Lake
<a name="appfabric-integration-disable"></a>

To stop receiving AppFabric audit logs, you can use the Security Lake console, Security Lake API, or AWS CLI to delete AppFabric as a custom source. For instructions, see [Deleting a custom source from Security Lake](delete-custom-source.md).

# Integration with AWS Security Hub CSPM
<a name="securityhub-integration"></a>

**Integration type:** Source

[AWS Security Hub CSPM](https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html) provides you with a comprehensive view of your security state in AWS and helps your environment against security industry standards and best practices. Security Hub CSPM collects security data from across AWS accounts, services, and supported third-party partner products and helps you to analyze your security trends and identify the highest priority security issues.

When you enable Security Hub CSPM and add Security Hub CSPM findings as a source in Security Lake, Security Hub CSPM starts sending new findings and updates to existing findings to Security Lake.

## How Security Lake receives Security Hub CSPM findings
<a name="securityhub-integration-sending-findings"></a>

In Security Hub CSPM, security issues are tracked as findings. Some findings come from issues that are detected by other AWS services or by third-party partners. Security Hub CSPM also generates its own findings by running automated and continuous security checks against rules. The rules are represented by security controls.

All findings in Security Hub CSPM use a standard JSON format called the [AWS Security Finding Format (ASFF)](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-findings-format.html).

Security Lake receives Security Hub CSPM findings and transforms them into the [Open Cybersecurity Schema Framework (OCSF) in Security Lake](open-cybersecurity-schema-framework.md).

## Send your Security Hub CSPM findings to Security Lake
<a name="send-securityhub-findings"></a>

To send Security Hub CSPM findings to Security Lake, you must enable both services and add Security Hub CSPM findings as a source in Security Lake. For instructions on adding an AWS source, see [Adding an AWS service as a source](internal-sources.md#add-internal-sources).

If you want Security Hub CSPM to generate [control findings ](https://docs.aws.amazon.com/securityhub/latest/userguide/controls-findings-create-update.html) and send them to Security Lake, you must enable the relevant security standards and turn on resource recording on a Regional basis in AWS Config. For more information, see [Enabling and configuring AWS Config](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-prereq-config.html) in the *AWS Security Hub User Guide*.

## Stop receiving Security Hub CSPM findings in Security Lake
<a name="securityhub-integration-disable"></a>

To stop receiving Security Hub CSPM findings, you can use the Security Hub CSPM console, Security Hub CSPM API, or AWS CLI in the following topics in the *AWS Security Hub User Guide*:
+ [Disabling and enabling the flow of findings from an integration (console)](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-integrations-managing.html#securityhub-integration-findings-flow-console)
+ [Disabling the flow of findings from an integration (Security Hub API, AWS CLI)](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-integrations-managing.html#securityhub-integration-findings-flow-disable-api)

# Third-party integrations with Security Lake
<a name="integrations-third-party"></a>

Amazon Security Lake integrates with multiple third-party providers. A provider may offer a *source integration*, a *subscriber integration*, or a *service integration*. Providers may offer one or more integration types.

Source integrations have the following properties:
+ Send data to Security Lake
+ Data arrives in Apache Parquet format
+ Data arrives in the [Open Cybersecurity Schema Framework (OCSF) in Security Lake](open-cybersecurity-schema-framework.md) schema

Subscriber integrations have the following properties:
+ Read source data from Security Lake at an HTTPS endpoint or Amazon Simple Queue Service (Amazon SQS) queue, or by directly querying source data from AWS Lake Formation
+ Able to read data in Apache Parquet format
+ Able to read data in OCSF schema

Service integrations can help you implement Security Lake and other AWS services in your organization. They can also provide assistance with reporting, analytics, and other use cases.

To search for a specific partner provider, see the [Partner Solutions Finder](https://partners.amazonaws.com/search/partners/). To purchase a third-party product, see the [AWS Marketplace](https://aws.amazon.com/marketplace).

To request to be added as a partner integration or become a Security Lake partner, send an email to securitylake-partners@amazon.com.

If you use third-party integrations that send findings to AWS Security Hub CSPM, you can also review those findings in Security Lake if the Security Hub CSPM integration for Security Lake is enabled. For instructions on enabling the integration, see [Integration with AWS Security Hub CSPM](securityhub-integration.md). For a list of third-party integrations that send findings to Security Hub CSPM, see [Available third-party partner product integrations](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-partner-providers.html) in the *AWS Security Hub User Guide*.

Before setting up your subscribers verify your subscriber's OCSF log support. For the latest details, review your subscriber's documentation. 

## Query integration
<a name="partner-query-integraton"></a>

You can query the data that Security Lake stores in AWS Lake Formation databases and tables. You can also create third-party subscribers in the Security Lake console, API, or AWS Command Line Interface. 

The Lake Formation data lake administrator must grant `SELECT` permissions on the relevant databases and tables to the IAM identity that queries the data. You must create a subscriber in Security Lake before querying data. For more information about how to create a subscriber with query access, see [Managing query access for Security Lake subscribers](subscriber-query-access.md).

You can configure query integration with Security Lake for the following third-party partners.
+ Cribl – Search
+ IBM – QRadar
+ Palo Alto Networks – XSOAR
+ Query.AI – Query Federated Search
+ SOC Prime
+ [https://www.splunk.com/en_us/blog/conf-splunklive/federated-analytics-balancing-cost-efficiency-and-performance-with-data-lakes.html](https://www.splunk.com/en_us/blog/conf-splunklive/federated-analytics-balancing-cost-efficiency-and-performance-with-data-lakes.html) – Federated Analytics
+ Tego Cyber

## Accenture – MxDR
<a name="integration-accenture"></a>

**Integration type:** Subscriber, Service

Accenture's MxDR integration with Security Lake offers real-time data ingestion of logs and events, managed anomaly detection, threat hunting, and security operations. This aids analytics and managed detection and response (MDR).

As a service integration, Accenture can also help you implement Security Lake in your organization.

[Integration documentation](https://www.accenture.com/us-en/services/cloud/aws-business-group)

## Aqua Security
<a name="integration-aqua-security"></a>

**Integration type:** Source

Aqua Security can be added as a custom source to send audit events to Security Lake. The audit events are converted into OCSF schema and Parquet format.

[Integration documentation](https://support.aquasec.com/support/solutions/articles/16000151820-amazon-security-lake-integration)

## Barracuda – Email Protection
<a name="integration-barracuda"></a>

**Integration type:** Source

Barracuda Email Protection can send events to Security Lake when new phishing email attacks are detected. You can receive these events alongside other security data in your data lake.

[Integration documentation](https://campus.barracuda.com/product/emailprotection/doc/98214513/integrate-amazon-security-lake-with-email-protection/)

## Booz Allen Hamilton
<a name="integration-booz-allen-hamilton"></a>

**Integration type:** Service

As a service integration, Booz Allen Hamilton uses a data-driven approach to cybersecurity by fusing data and analytics with the Security Lake service.

[Partner link](https://www.boozallen.com/s/solution/booz-allen-s-amazon-web-services-premier-partnership.html)

## Bosch Software and Digital Solutions – AIShield
<a name="integration-bosch"></a>

**Integration type:** Source

AIShield powered by Bosch provides automated vulnerability analysis and endpoint protection for AI assets through its integration with Security Lake.

[Integration documentation](https://docs.boschaishield.com/amazon-security-lake)

## ChaosSearch
<a name="integration-chaossearch"></a>

**Integration type:** Subscriber

ChaosSearch offers multi-model data access to users with open APIs such as Elasticsearch and SQL, or with the Kibana and Superset UIs included natively. You can consume your Security Lake data in ChaosSearch without retention limits to monitor, alert, and threat hunt. This helps you face today’s complex security environments and persistent threats.

[Integration documentation](https://www.chaossearch.io/platform/integrations/amazon-security-lake)

## Cisco Security – Secure Firewall
<a name="integration-cisco-security"></a>

**Integration type:** Source

By integrating Cisco Secure Firewall with Security Lake, you can store firewall logs in a structured and scalable manner. Cisco's eNcore client streams firewall logs from the Firewall Management Center, performs schema conversion to OCSF schema, and stores them in Security Lake.

[Integration documentation](https://github.com/CiscoSecurity/fp-05-firepower-cli/tree/ocsf)

## Claroty – xDome
<a name="integration-claroty"></a>

**Integration type:** Source

Claroty xDome sends alerts detected within networks to Security Lake with minimal configuration. Flexible and rapid deployment options help xDome protect extended Internet of Things (XIoT) assets—consisting of IoT, IIoT, and BMS assets—within your network, while automatically detecting early indicators of threats.

[Integration documentation](https://claroty.com/resources/integration-briefs/claroty-xdome-and-amazon-security-lake)

## CMD Solutions
<a name="integration-cmd-solutions"></a>

**Integration type:** Service

CMD Solutions helps businesses increase their agility by integrating security early and continuously through design, automation, and continuous assurance processes. As a service integration, CMD Solutions can help you implement Security Lake in your organization.

[Partner link](https://www.cmdsolutions.com.au/service/security/)

## Confluent – Amazon S3 Sink Connector
<a name="integration-confluent"></a>

**Integration type:** Source

Confluent automatically connects, configures, and orchestrates data integrations with fully-managed, pre-built connectors. The Confluent S3 Sink Connector lets you take raw data and sink it into Security Lake at scale in native parquet format.

[Integration documentation](https://www.confluent.io/resources/brief/amazon-security-lake/?utm_campaign=tm.partner_cd.cwc-securitylake-newuser&utm_medium=partnerref)

## Contrast Security
<a name="integration-contrast"></a>

**Integration type:** Source

**Partner product for the integration: **Contrast Assess

Contrast Security Assess is an IAST tool offering real-time vulnerability detection in web apps, APIs, and microservices. Assess integrates with Security Lake to help provide centralized visibility for all your workloads.

[Integration documentation](https://docs.contrastsecurity.com/en/aws-security-lake.html)

## Cribl – Search
<a name="integration-cribl-search"></a>

**Integration type:** Subscriber

You can use Cribl Search to search Security Lake data.

[Integration documentation](https://docs.cribl.io/search/set-up-amazon-security-lake/)

## Cribl – Stream
<a name="integration-cribl"></a>

**Integration type:** Source

You can use Cribl Stream to send data from any Cribl supported third-party sources to Security Lake in OCSF schema.

[Integration documentation](https://docs.cribl.io/stream/usecase-security-lake/)

## CrowdStrike – Falcon Data Replicator
<a name="integration-crowdstrike"></a>

**Integration type:** Source

This integration pulls data from the CrowdStrike Falcon Data Replicator on a continuous streaming basis, transforms the data into OCSF schema, and sends it to Security Lake.

[Integration documentation](https://github.com/CrowdStrike/aws-security-lake)

## CrowdStrike – Next Gen SIEM
<a name="integration-crowdstrike-siem"></a>

**Integration type:** Subscriber

Simplify ingestion of Security Lake data with the CrowdStrike Falcon Next-Gen SIEM data connector featuring native OCSF schema parsers. Falcon NG SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches. 

[Integration documentation]( https://marketplace.crowdstrike.com/listings/amazon-security-lake-data-connector)

## CyberArk – Unified Identify Security Platform
<a name="integration-cyberark"></a>

**Integration type:** Source

CyberArk Audit Adapter, an AWS Lambda function, collects security events from CyberArk Identity Security Platform and sends the data to Security Lake in OCSF schema.

[Integration documentation](https://cyberark-customers.force.com/mplace/s/#a352J000001I8I1QAK-a392J000001pB1lQAE)

## Cyber Security Cloud – Cloud Fastener
<a name="integration-cybersecuritycloud"></a>

**Integration type:** Subscriber

CloudFastener leverages Security Lake to make it easier to consolidate security data from your cloud environments.

[Integration documentation](https://cloud-fastener.com/en/#securityLake)

## DataBahn
<a name="integration-databahn"></a>

**Integration type:** Source

Centralize your security data in Security Lake using DataBahn’s Security Data Fabric.

[Integration documentation (sign in to the DataBahn portal to review the documentation)](https://app.cp-us01-prod01-aws.databahn.app/help/docs/highway/destinations/amazon-web-services/aws-security-lake)

## Darktrace – Cyber AI Loop
<a name="integration-darktrace"></a>

**Integration type:** Source

The Darktrace and Security Lake integration brings the power of Darktrace self-learning to Security Lake. Insights from Cyber AI Loop can be correlated against other data streams and elements of your organization's security stack. The integration logs Darktrace model breaches as security findings.

[Integration documentation (sign in to the Darktrace portal to review the documentation)](https://customerportal.darktrace.com/product-guides/main/aws-security-lake-alerts-intro)

## Datadog
<a name="integration-datadog"></a>

**Integration type:** Subscriber

Datadog Cloud SIEM detects real-time threats to your cloud environment, including data in Security Lake, and unifies DevOps and security teams in one platform.

[Integration documentation](https://docs.datadoghq.com/integrations/amazon_security_lake)

## Deloitte – MXDR Cyber Analytics and AI Engine (CAE)
<a name="integration-deloitte"></a>

**Integration type:** Subscriber, Service

Deloitte MXDR CAE helps you quickly store, analyze, and visualize your standardized security data. The CAE suite of customized analytic, AI, and ML capabilities automatically provide actionable insights based on models that run against the OCSF-formatted data in Security Lake.

As a service integration, Deloitte can also help you implement Security Lake in your organization.

[Integration documentation](https://www2.deloitte.com/us/en/pages/about-deloitte/solutions/deloitte-aws-relationship.html)

## Devo
<a name="integration-devo"></a>

**Integration type:** Subscriber

The Devo collector for AWS supports ingestion from Security Lake. This integration can help you analyze and address a variety of security use cases, such as threat detection, investigation, and incident response.

[Integration documentation](https://docs.devo.com/space/latest/324337730/Amazon+Security+Lake+collector)

## DXC – SecMon
<a name="integration-dxc"></a>

**Integration type:** Subscriber, Service

DXC SecMon collects security events from Security Lake and monitors them to detect and alert on potential security threats. This helps organizations gain a better understanding of their security posture and proactively identify and respond to threats.

As a service integration, DXC can also help you implement Security Lake in your organization.

[Integration documentation](https://dxc.com/us/en/about-us/partner-ecosystem/aws)

## Eviden – AIsaac (formerly Atos)
<a name="integration-eviden"></a>

**Integration type:** Subscriber

The AIsaac MDR platform consumes VPC Flow Logs ingested in OCSF schema in Security Lake and utilizes AI models for detecting threats.

[Integration documentation](https://eviden.com/solutions/digital-security/managed-security-services/managed-detection-and-response/)

## ExtraHop – Reveal(x) 360
<a name="integration-extrahop"></a>

**Integration type:** Source

You can enhance your workload and application security by integrating network data, including detections of IOCs, from ExtraHop Reveal(x) 360, to Security Lake in OCSF schema

[Integration documentation](https://forums.extrahop.com/t/aws-security-lake)

## Falcosidekick
<a name="integration-falco-project"></a>

**Integration type:** Source

Falcosidekick collects and sends Falco events to Security Lake. This integration exports security events using the OCSF schema.

[Integration documentation](https://falco.org/blog/falco-aws-security-lake/)

## Fortinet - Cloud Native Firewall
<a name="integration-fortinet"></a>

**Integration type:** Source

When creating FortiGate CNF instances in AWS, you can specify Amazon Security Lake as a log output destination.

[Integration documentation](https://docs.fortinet.com/document/fortigate-cnf/latest/administration-guide/248370)

## Gigamon – Application Metadata Intelligence
<a name="integration-gigamon"></a>

**Integration type:** Source

Gigamon Application Metadata Intelligence (AMI) empowers your observability, SIEM, and network performance monitoring tools with critical metadata attributes. This helps provide deeper application visibility so you can pinpoint performance bottlenecks, quality issues, and potential network security risks.

[Integration documentation](https://www.gigamon.com/content/dam/resource-library/english/deployment-guide/gigamon-amazon-security-lake-integration-quick-start-guide.pdf)

## Hoop Cyber
<a name="integration-hoopcyber"></a>

**Integration type:** Service

Hoop Cyber FastStart includes a data source assessment, prioritization, onboarding of data sources and helps customers query their data with existing tools and integrations offered through Security Lake.

[Partner link](https://aws.amazon.com/marketplace/pp/prodview-5dm5aecyvpn2i)

## HTCD – AI-First Cloud Security Platform
<a name="integration-htcd"></a>

**Integration type:** Subscriber

Gain instantaneous compliance automation, prioritization of security findings, and tailored patches. HTCD can query Security Lake to help you uncover threats with natural language queries and AI-driven insights.

[Integration documentation](https://www.htcd.com/post/secdataops-with-aws-security-lake)

## IBM – QRadar
<a name="integration-ibm"></a>

**Integration type:** Subscriber

IBM Security QRadar SIEM with UAX integrates Security Lake with an analytics platform that identifies and prevents threats across hybrid clouds. This integration supports both data access and query access.

[Integration documentation on consuming AWS CloudTrail logs](https://www.ibm.com/docs/en/dsm?topic=aac-configuring-amazon-aws-cloudtrail-log-source-that-uses-amazon-security-lake)

[Integration documentation on using Amazon Athena for queries](https://www.ibm.com/docs/en/cloud-paks/cp-security/1.10?topic=connectors-amazon-athena)

## Infosys
<a name="integration-infosys"></a>

**Integration type:** Service

Infosys helps you customize your Security Lake implementation for your organizational needs and provides custom insights.

[Partner link](https://www.infosys.com/services/cloud-cobalt/offerings/managed-security-services.html)

## Insbuilt
<a name="integration-insbuilt"></a>

**Integration type:** Service

Insbuilt specializes in cloud consulting services and can help you understand how to implement Security Lake in your organization.

[Partner link](https://insbuilt.com/en/security-lake-eng/)

## Kyndryl – AIOps
<a name="integration-kyndryl"></a>

**Integration type:** Subscriber, Service

Kyndryl integrates with Security Lake to provide interoperability of cyberdata, threat intelligence, and AI-powered analytics. As a data access subscriber, Kyndryl ingests AWS CloudTrail Management Events from Security Lake for analytics purposes.

As a service integration, Kyndryl can also help you implement Security Lake in your organization.

[Integration documentation](https://www.kyndryl.com/us/en/about-us/news/2022/11/kyndryl-aws-data-security)

## Lacework – Polygraph
<a name="integration-lacework"></a>

**Integration type:** Source

Lacework Polygraph® Data Platform integrates with Security Lake as a data source and provides security findings about vulnerabilities, misconfigurations, and known and unknown threats across your AWS environment.

[Integration documentation](https://docs.lacework.com/onboarding/amazon-security-lake)

## Laminar
<a name="integration-laminar"></a>

**Integration type:** Source

Laminar sends data security events to Security Lake in OCSF schema, making them available for additional analytics use cases, such as incident response and investigation.

[Integration documentation](https://laminar-docs.s3.us-east-2.amazonaws.com/security_lake_manual/Laminar+Integration+with+Amazon+Security+Lake+c67638221f6e476d8d2c36aee447864c.html)

## MegazoneCloud
<a name="integration-megazonecloud"></a>

**Integration type:** Service

MegazoneCloud specializes in cloud consulting services and can help you understand how to implement Security Lake in your organization. We connect Security Lake with integrated ISV solutions to build custom tasks, and build customized insights related with customer needs.

[Integration documentation](https://www.megazone.com/us/amazon_security_lake/)

## Monad
<a name="integration-monad"></a>

**Integration type:** Source

Monad automatically transforms your data into OCSF schema and sends it to your Security Lake data lake.

[Integration documentation](https://docs.monad.security/output/security-lake/)

## NETSCOUT – Omnis Cyber Intelligence
<a name="integration-netscout"></a>

**Integration type:** Source

By integrating with Security Lake, NETSCOUT becomes a custom source of security findings and detailed security insights into what’s happening in your enterprise, such as cyberthreats, security risks, and attack surface changes. These findings are produced in the customer account by NETSCOUT CyberStreams and Omnis Cyber Intelligence, and then sent to Security Lake in OCSF schema. The ingested data also meets other requirements and best practices for a Security Lake source, including format, schema, partitioning, and performance-related aspects.

[Integration documentation](https://www.netscout.com/resources/amazon-data-lake)

## Netskope – CloudExchange
<a name="integration-netskope"></a>

**Integration type:** Source

Netskope helps you strengthen your security posture by sharing security-related logs and threat information with Security Lake. Netskope findings are sent to Security Lake with a CloudExchange Plugin, which can be launched as a docker-based environment within AWS or in a local data center.

[Integration documentation](https://docs.netskope.com/en/netskope-help/integrations-439794/netskope-cloud-exchange/log-shipper-module/configure-3rd-party-log-shipper-plugins/amazon-security-lake-v1-1-0-plugin-for-log-shipper/)

## New Relic ONE
<a name="integration-new-relic"></a>

**Integration type:** Subscriber

New Relic ONE is a Lambda-based subscriber application. It's deployed in your account, triggered by Amazon SQS, and sends data to New Relic using New Relic license keys

[Integration documentation](https://docs.newrelic.com/docs/infrastructure/amazon-integrations/aws-integrations-list/aws-security-lake-monitoring-integration/)

## Okta – Workforce Identity Cloud
<a name="integration-okta"></a>

**Integration type:** Source

Okta sends identity logs to Security Lake in OCSF schema through an Amazon EventBridge integration. Okta System Logs in OCSF schema will help security and data scientist teams to query security events by an open source standard. Generating standardized OCSF logs from Okta helps you perform audit activities and generate reports related to authentication, authorization, account changes, and entity changes under a consistent schema.

[Integration documentation](https://www.okta.com/blog/2022/11/an-automated-approach-to-convert-okta-system-logs-into-open-cybersecurity-schema/)

[AWS CloudFormation template to add Okta as a custom source in Security Lake](https://github.com/okta/okta-ocsf-syslog)

## Orca – Cloud Security Platform
<a name="integration-orca"></a>

**Integration type:** Source

The Orca agentless cloud security platform for AWS integrates with Security Lake by sending Cloud Detection and Response (CDR) events in OCSF schema.

[Integration documentation (sign in to the Orca portal to review the documentation)](https://docs.orcasecurity.io/v1/docs/integrating-amazon-security-lake)

## Palo Alto Networks – Prisma Cloud
<a name="integration-palo-alto-networks-prisma"></a>

**Integration type:** Source

Palo Alto Networks Prisma Cloud aggregates vulnerability detection data across VMs in your cloud-native environments and sends it to Security Lake. 

[Integration documentation](https://docs.prismacloud.io/en/enterprise-edition/content-collections/administration/configure-external-integrations-on-prisma-cloud/integrate-prisma-cloud-with-amazon-security-lake)

## Palo Alto Networks – XSOAR
<a name="integration-palo-alto-networks-xsoar"></a>

**Integration type:** Suscriber

Palo Alto Networks XSOAR has built a subscriber integration with XSOAR and Security Lake. 

[Integration documentation](https://xsoar.pan.dev/docs/reference/integrations/aws-security-lake/)

## Panther
<a name="integration-panther"></a>

**Integration type:** Subscriber

Panther supports ingesting Security Lake logs for use in search and detection.

[Integration documentation](https://docs.panther.com/data-onboarding/supported-logs/aws/security-lake)

## Ping Identity – PingOne
<a name="integration-ping-identity"></a>

**Integration type:** Source

PingOne sends account modification alerts to Security Lake in OCSF schema and Parquet format, allowing you to discover and act upon account changes.

[Integration documentation](https://github.com/pingone-davinci/pingone-amazon-security-lake/blob/main/README.md)

## PwC – Fusion center
<a name="integration-pwc"></a>

**Integration type:** Subscriber, Service

PwC brings knowledge and expertise to aid clients in implementing a fusion center to meet their individual needs. Built on Amazon Security Lake, a fusion center provides the ability to combine data from a variety of sources to create a centralized, near real-time view.

[Integration documentation](https://www.pwc.com/us/en/services/alliances/amazon-web-services/fusion-center.html)

## Query.AI – Query Federated Search
<a name="query-ai"></a>

**Integration type:** Subscriber

Query Federated Search can directly query any Security Lake table via Amazon Athena to support incident response, investigations, threat hunting, and general search across a variety of Observables, Events, and Objects in the OCSF schema.

[Integration documentation](https://docs.query.ai/docs/amazon-security-lake#overview)

## Rapid7 – InsightIDR
<a name="integration-rapid7"></a>

**Integration type:** Subscriber

InsightIDR, the Rapid7 SIEM/XDR solution, can ingest logs in Security Lake for threat detection and investigation of suspicious activity.

[Integration documentation](https://docs.rapid7.com/insightidr/aws-security-lake/)

## RipJar – Labyrinth for Threat Investigations
<a name="integration-ripjar"></a>

**Integration type:** Subscriber

Labyrinth for Threat Investigations provides an enterprise-wide approach to threat exploration at scale based on data fusion, with fine-grained security, adaptable workflows, and reporting.

[Integration documentation](https://github.com/ripjar/aws-security-lake)

## Sailpoint
<a name="integration-sailpoint"></a>

**Integration type:** Source

**Partner product for the integration: **SailPoint IdentityNow

This integration enables customers to transform event data from SailPoint IdentityNow. The integration is intended to provide an automated process to bring IdentityNow user activity and governance events into Security Lake to improve insights from security incident and event monitoring products.

[Integration documentation](https://community.sailpoint.com/t5/IdentityNow-Wiki/SailPoint-IdentityNow-AuditEvent-Integration-for-Amazon-Security/ta-p/241725)

## Securonix
<a name="integration-securonix"></a>

**Integration type:** Subscriber

Securonix Next-Gen SIEM integrates with Security Lake, empowering security teams to ingest data more quickly and expand their detection and response capabilities.

[Integration documentation](https://documentation.securonix.com/bundle/securonix-cloud-user-guide/page/content/active-deployment-guides/amazon-security-lake-cloud-trail-logs-in-ocsf-format_.htm)

## SentinelOne
<a name="integration-sentinelone"></a>

**Integration type:** Subscriber

The SentinelOne Singularity™ XDR Platform extends real-time detection and response to endpoint, identity, and cloud workloads running on on-premises and public cloud infrastructure, including Amazon Elastic Compute Cloud (Amazon EC2), Amazon Elastic Container Service (Amazon ECS), and Amazon Elastic Kubernetes Service (Amazon EKS).

[Integration documentation (sign in to the SentinelOne portal to review the documentation)](https://support.sentinelone.com/hc/en-us/articles/10249372394519)

## Sentra – Data Lifecyle Security Platform
<a name="integration-sentra"></a>

**Integration type:** Source

After deploying the Sentra scanning infrastructure in your account, Sentra fetches findings and ingest them into your SaaS. These findings are metadata that Sentra stores and later streams to Security Lake in OCSF schema for querying. 

[Integration documentation](https://docs.sentra.io/integrations/amazon-security-lake)

## SOC Prime
<a name="integration-socprime"></a>

**Integration type:** Subscriber

SOC Prime integrates with Security Lake through Amazon OpenSearch Service and Amazon Athena to facilitate smart data orchestration and threat hunting based on zero trust milestones. SOC Prime empowers security teams to increase threat visibility and investigate incidents without an overwhelming volume of alerts. You can save development time with reusable rules and queries that are automatically convertible to Athena and OpenSearch Service in the OCSF schema.

[Integration documentation](https://tdm.socprime.com/attack-detective/start-page)

## Splunk
<a name="integration-splunk"></a>

**Integration type:** Subscriber

The Splunk AWS Add-On for Amazon Web Services (AWS) supports ingestion from Security Lake. This integration helps you accelerate threat detection, investigation, and response by subscribing to data in OCSF schema from Security Lake.

[Integration documentation](https://splunkbase.splunk.com/app/1876)

## Stellar Cyber
<a name="integration-stellarcyber"></a>

**Integration type:** Subscriber

Stellar Cyber consumes logs from Security Lake and adds the records to the Stellar Cyber data lake. This connector uses OCSF schema.

[Integration documentation](https://stellarcyber.ai/news/press-releases/stellar-cyber-announces-support-for-amazon-security-lake-to-speed-data-processing-and-threat-detection-2/)

## Sumo Logic
<a name="integration-sumo-logic"></a>

**Integration type:** Subscriber

Sumo Logic consumes data from Security Lake and provides broad visibility across AWS, on-premise, and hybrid cloud environments. Sumo Logic gives security teams comprehensive visibility, automation, and threat monitoring across all of their security tools.

[Integration documentation](https://help.sumologic.com/docs/send-data/hosted-collectors/amazon-aws/amazon-security-lake-source/)

## Swimlane – Turbine
<a name="integration-swimlane"></a>

**Integration type:** Subscriber

Swimlane ingests data from Security Lake in OCSF schema, and sends the data through low-code playbooks and case management to facilitate faster threat detection, investigation, and incident response.

[Integration documentation (sign in to the Swimlane portal to review the documentation)](https://swimlane.freshdesk.com/support/login)

## Sysdig Secure
<a name="integration-sysdig"></a>

**Integration type:** Source

Sysdig Secure's cloud-native application protection platform (CNAPP) sends security events to Security Lake to maximize oversight, streamline investigations, and simplify compliance.

[Integration documentation](https://sysdig.com/content/c/pf-forwarding-sysdig-events-to-amazon-security-lake?x=u_WFRi)

## Talon
<a name="integration-talon"></a>

**Integration type:** Source

**Partner product for the integration:** Talon Enterprise Browser

Talon's Enterprise Browser, a secure and isolated browser-based endpoint environment, sends Talon Access, data protection, SaaS actions, and security events to Security Lake providing visibility and options to cross-correlate events for detection, forensics, and investigations.

[Integration documentation (sign in to the Talon portal to review the documentation)](https://docs.console.talon-sec.com/en/articles/355-event-forwarding-with-amazon-security-lake)

## Tanium
<a name="integration-tanium"></a>

**Integration type:** Source

Tanium Unified Cloud Endpoint Detection, Management, and Security Platform provides inventory data to Security Lake in OCSF schema.

[Integration documentation](https://help.tanium.com/bundle/aws-integration/page/AWS-Integration/Introduction.htm)

## TCS
<a name="integration-tcs"></a>

**Integration type:** Service

The TCS AWS Business Unit offers innovation, experience, and talent. This integration is powered by a decade of joint value creation, deep industry knowledge, technology expertise, and delivery wisdom. As a service integration, TCS can help you implement Security Lake in your organization.

[Integration documentation](https://aws.amazon.com/partners/tataconsultancyservices/)

## Tego Cyber
<a name="integration-tego-cyber"></a>

**Integration type:** Subscriber

Tego Cyber integrates with Security Lake to help you swiftly detect and investigate potential security threats. By correlating diverse threat indicators across extensive time frames and log sources, Tego Cyber uncovers hidden threats. The platform is enriched with highly contextual threat intelligence, providing precision and insight in threat detection and investigations.

[Integration documentation](https://www.tegocyber.com/product/amazon/aws-technical)

## Tines – No-code security automation
<a name="integration-tines"></a>

**Integration type:** Subscriber

Tines No-code security automation helps you make more accurate decisions by leveraging security data centralized in Security Lake.

[Integration documentation](https://explained.tines.com)

## Torq – Enterprise Security Automation Platform
<a name="integration-torq"></a>

**Integration type:** Source, Subscriber

Torq seamlessly integrates with Security Lake as both a custom source and a subscriber. Torq helps you implement enterprise-scale automation and orchestration with a simple no-code platform.

[Integration documentation](https://torq.io/blog/secops-pipelines-aws/)

## Trellix – XDR
<a name="integration-trellix"></a>

**Integration type:** Source, Subscriber

As an open XDR platform, Trellix XDR supports the Security Lake integration. Trellix XDR can leverage data in OCSF schema for security analytics use cases. You can also augment your Security Lake data lake with 1,000\$1 sources of security events in Trellix XDR. This helps you extend detection and response capabilities for your AWS environment. Ingested data is correlated with other security risks, providing you with the necessary playbooks to respond to a risk in a timely manner.

[Integration documentation](https://www.trellix.com/en-us/assets/docs/trellix-helix-amazon-security-lake-instructions.pdf)

## Trend Micro – CloudOne
<a name="integration-trend-micro"></a>

**Integration type:** Source

Trend Micro CloudOne Workload Security sends the following information to Security Lake from your Amazon Elastic Compute Cloud (EC2) instances:
+ DNS Query activity
+ File activity
+ Network activity
+ Process activity
+ Registry Value activity
+ User Account activity

[Integration documentation](https://cloudone.trendmicro.com/docs/integrations/aws-security-lake/)

## Uptycs – Uptycs XDR
<a name="integration-uptycs"></a>

**Integration type:** Source

Uptycs sends a wealth of data in OCSF schema from on-premises and cloud assets to Security Lake. The data includes behavioral threat detections from endpoints and cloud workloads, anomaly detections, policy violations, risky policies, misconfigurations, and vulnerabilities.

[Integration documentation](https://www.uptycs.com/partners/aws)

## Vectra AI – Vectra Detect for AWS
<a name="integration-vectra-ai"></a>

**Integration type:** Source

By using Vectra Detect for AWS, you can send high-fidelity alerts to Security Lake as a custom source using a dedicated CloudFormation template.

[Integration documentation](https://support.vectra.ai/s/article/KB-VS-1621)

## VMware Aria Automation for Secure Clouds
<a name="integration-vmware"></a>

**Integration type:** Source

With this integration, you can detect cloud misconfigurations and send them to Security Lake for advanced analysis.

[Integration documentation](https://docs.vmware.com/en/CloudHealth-Secure-State/services/chss-getting-started/GUID-integrations-s3.html)

## Wazuh
<a name="integration-wazuh"></a>

**Integration type:** Subscriber

Wazuh aims to securely handle user data, provide query access for each source, and optimize querying costs.

[Integration documentation](https://wazuh.com/blog/wazuh-integration-with-amazon-security-lake/)

## Wipro
<a name="integration-wipro"></a>

**Integration type:** Source, Service

This integration allows you to collect data from the Wipro Cloud Application Risk Governance (CARG) platform to provide a unified view of your cloud applications and compliance postures across an enterprise.

As a service integration, Wipro can also help you implement Security Lake in your organization.

[Integration documentation](https://www.wipro.com/newsroom/press-releases/2022/wipro-to-support-new-aws-cybersecurity-data-lake-service/)

## Wiz – CNAPP
<a name="integration-wiz"></a>

**Integration type:** Source

The integration between Wiz and Security Lake facilitates cloud security data collection in a single security data lake by leveraging the OCSF schema, an open source standard designed for extensible and normalized security data exchange.

[Integration documentation (sign in to the Wiz portal to review the documentation)](https://docs.wiz.io/wiz-docs/docs/security-lake-integration)

## Zscaler – Zscaler Posture Control
<a name="integration-zscaler"></a>

**Integration type:** Source

Zscaler Posture Control™, a cloud native application protection platform, sends security findings to Security Lake in OCSF schema.

[Integration documentation](https://help.zscaler.com/zpc/integrating-amazon-security-lake)