Integrations
Connect your existing tools to Claw GRC for automated evidence collection. Integrations eliminate manual evidence gathering — once connected, your compliance posture updates continuously as your systems change.
Overview of All 18 Integrations
Claw GRC integrates with the most common cloud, developer, identity, and security tools. Each integration has a different evidence collection scope — some collect continuously, others on a daily schedule.
| Integration | Category | Evidence Collected |
|---|---|---|
| AWS CloudTrail | Cloud Infrastructure — Access logs, config changes, IAM events, compliance reports | Continuous |
| AWS Config | Cloud Infrastructure — Resource configuration history, compliance rule evaluations | Daily |
| AWS IAM | Identity — IAM credential report, access analyzer findings, policy reports | Daily |
| GitHub | Developer — Branch protection, PR reviews, signed commits, dependency alerts, secrets scanning | Daily |
| GitLab | Developer — MR approvals, pipeline results, DAST/SAST reports, container scanning | Daily |
| Okta | Identity — MFA enrollment, session policies, admin access logs, user lifecycle | Continuous |
| Google Workspace | Identity & SaaS — Access logs, 2-step enrollment, DLP reports, audit logs | Daily |
| Microsoft Entra ID | Identity — Conditional access policies, MFA status, privileged identity management | Daily |
| Slack | Communication — Training completion notifications, policy acknowledgment records, incident alerts | Webhook |
| Jira | Project Management — Change management tickets, incident timelines, security review approvals | Daily |
| Linear | Project Management — Issue tracking, security reviews, sprint completion records | Daily |
| Snyk | Security — Dependency vulnerability reports, license compliance, container image scans | Daily |
| Dependabot | Security — GitHub-native dependency alerts and auto-remediation status | Daily |
| Datadog | Monitoring — Alerting rules, log management configuration, uptime reports | Daily |
| PagerDuty | Incident Response — Incident timelines, escalation policy records, on-call schedules | Daily |
| Cloudflare | Network Security — WAF rule configuration, DDoS protection reports, access logs | Daily |
| Google Cloud (GCP) | Cloud Infrastructure — Cloud Audit Logs, Security Command Center reports, IAM binding reports | Continuous |
| Azure | Cloud Infrastructure — Azure Monitor logs, Security Center recommendations, RBAC reports | Daily |
Connect GitHub + AWS first
For most SOC 2 and ISO 27001 journeys, connecting GitHub and AWS CloudTrail first provides the most evidence coverage. These two integrations alone can auto-satisfy 30–40% of SOC 2 controls with fresh evidence.AWS Setup Guide
The AWS integration uses a cross-account IAM role for read-only access to your AWS environment. No credentials are stored in Claw GRC — we use role assumption.
Create the IAM role
~5 minIn your AWS account, create an IAM role with the following configuration:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"cloudtrail:DescribeTrails",
"cloudtrail:GetTrailStatus",
"cloudtrail:LookupEvents",
"config:DescribeConfigRules",
"config:GetComplianceDetailsByConfigRule",
"iam:GenerateCredentialReport",
"iam:GetCredentialReport",
"iam:ListUsers",
"iam:ListPolicies",
"iam:GetAccountPasswordPolicy",
"iam:ListMFADevices",
"iam:ListVirtualMFADevices",
"s3:GetBucketAcl",
"s3:GetBucketPolicy",
"s3:GetBucketVersioning",
"s3:ListAllMyBuckets",
"ec2:DescribeSecurityGroups",
"ec2:DescribeInstances"
],
"Resource": "*"
}
]
}Set trust policy
~2 minSet the role's trust policy to allow Claw GRC to assume it:
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::123456789012:root"
},
"Action": "sts:AssumeRole",
"Condition": {
"StringEquals": {
"sts:ExternalId": "YOUR_CLAW_GRC_EXTERNAL_ID"
}
}
}]
}Get your External ID from Dashboard → Integrations → AWS → Connect → Step 2. The External ID is unique per organization and prevents confused deputy attacks.
Enter role ARN in Claw GRC
~1 minCopy the IAM role ARN (format: arn:aws:iam::123456789012:role/ClawGRCRole) and paste it into the AWS integration setup in Claw GRC. Click Test Connectionto verify the role assumption works, then Save Integration.
GitHub Setup Guide
GitHub integration uses a GitHub App installed on your organization. This provides fine-grained, revocable permissions — no personal access tokens.
Install the Claw GRC GitHub App
~3 minNavigate to Dashboard → Integrations → GitHub → Install App. You'll be redirected to GitHub to install the Claw GRC app on your organization. Select which repositories to grant access to (all repos, or specific repos).
Required permissions: Read access to repository contents, code scanning alerts, Dependabot alerts, pull requests, and organization metadata. No write permissions are requested.
Authorize the integration
~1 minAfter installing the app, you'll be redirected back to Claw GRC with an authorization code. The integration is automatically activated. You'll see a green checkmark indicating successful connection.
Configure collection scope
~2 minIn the GitHub integration settings, configure:
- Repository filter — Scope collection to specific repositories or patterns (e.g.,
*-api) - Default branch — Which branch represents your production baseline
- Evidence types — Toggle which evidence types to collect (branch protection, signed commits, etc.)
Okta Setup Guide
Okta integration uses an Okta API token with read-only scopes.
Create a read-only API token
~3 minIn the Okta admin console, navigate to Security → API → Tokens → Create Token. Name the token ClawGRC-ReadOnly. The token inherits the permissions of the creating admin account — use a dedicated service account with read-only privileges.
Use a dedicated service account
Don't create the Okta API token with your personal admin account. Create a dedicatedclaw-grc-service@yourcompany.com account with read-only permissions, and use that to generate the token.Enter Okta domain and token
~1 minIn Claw GRC, navigate to Integrations → Okta → Connect. Enter your Okta domain (format: yourcompany.okta.com) and paste the API token. Click Test & Save.
MCP Server Integration
The Claw GRC MCP Server is a special integration that lets AI agents (Claude, GPT-4, or any MCP-compatible assistant) directly query and interact with your compliance data.
For full MCP setup instructions and tool reference, see the MCP Protocol documentation.
{
"mcpServers": {
"claw-grc": {
"command": "npx",
"args": ["claw-grc-mcp-server@latest"],
"env": {
"CLAW_GRC_API_KEY": "cgrc_live_...",
"CLAW_GRC_ORG_ID": "00000000-0000-0000-0000-000000000001"
}
}
}
}