Checkmarx Integration
Overview
The Checkmarx integration brings your application security findings into the Praetorian Guard Platform (PGP), giving you a unified view of code-level vulnerabilities alongside your broader attack surface. SAST, SCA, secrets detection, infrastructure-as-code (KICS), and container findings from Checkmarx flow into PGP as risks — linked to the repositories they belong to — so you can prioritize remediation across your entire security posture from one place.
If you already rely on Checkmarx for code scanning, this integration lets you keep using it while PGP becomes the central system of record for all findings, assets, and risk workflow.
Why Connect Checkmarx to Guard
Application security findings often live in a silo, separate from your network, cloud, and external attack surface data. That split creates blind spots:
Fragmented prioritization — A critical SAST finding in a public-facing service may deserve more urgency than one in an internal tool, but you can’t tell without correlating against your attack surface.
Inconsistent workflows — Teams triage code vulnerabilities in Checkmarx and infrastructure risks in another tool, duplicating effort and losing context.
Incomplete reporting — Stakeholders want one view of organizational risk, not separate exports from five tools.
Connecting Checkmarx to Guard solves this by automatically importing your scan results and mapping them to repositories in your asset inventory. You get a single prioritized risk list, one triage workflow, and unified reporting — while Checkmarx continues to handle the scanning.
What the Integration Does
The integration is read-only: PGP pulls data from Checkmarx and does not modify your projects, scans, or results in Checkmarx.
How it works:
Authentication — PGP uses your Checkmarx One URL and API key to obtain a short-lived access token via OpenID Connect. No credentials are stored in Checkmarx by PGP.
Project discovery — PGP lists all projects in your Checkmarx One tenant.
Scan collection — For each project, PGP fetches recent completed scans (from the last 7 days, with at least one per project when available).
Repository creation — Each project with a Git repository URL in its scan metadata is represented as a repository asset in PGP.
Results import — Scan findings are converted to risks in PGP, linked to the corresponding repository.
Supported Finding Types
Intelligent Filtering
Not every Checkmarx finding needs to land in PGP. The integration automatically filters out noise so you focus on what is actionable:
Included: Findings in To Verify or Confirmed states
Excluded: Findings marked Not Exploitable, Proposed Not Exploitable, or Fixed
Excluded: Informational severity findings
Excluded: SCA results with local-only attack vectors (non-network CVSS) or SSCS Scorecard results
Severity levels (Critical, High, Medium, Low) from Checkmarx map directly to PGP triage levels. For SCA findings, the CVSS score takes precedence over the stated severity when available.
Prerequisites
Before setting up the integration, ensure you have:
A Checkmarx One (AST) tenant — for example,
https://ast.checkmarx.netor a region-specific URL likehttps://eu-2.ast.checkmarx.netAn API key (refresh token) from Checkmarx with access to projects and scan results
Permission to add integrations in your PGP deployment
Setup Steps
Step 1: Identify Your Checkmarx One URL
Log in to your Checkmarx One (AST) tenant
Copy the base URL from your browser — for example,
https://ast.checkmarx.netorhttps://eu-2.ast.checkmarx.netNo trailing slash is needed
Step 2: Generate an API Key in Checkmarx
In Checkmarx One, navigate to Settings (gear icon) → Identity and Access Management
Create or select an API key with access to Projects and Scans/Results
Generate the key and copy the refresh token — this is the value you will enter as “API Key” in PGP
Store it securely; it may not be displayed again
For detailed instructions, see Checkmarx: Generating an API Key.
Step 3: Add the Integration in PGP
In PGP, open Integrations from the main navigation
Find Checkmarx SAST under the Secure Code Scanning category
Click Connect
In the setup form, enter:
Checkmarx One URL — the base URL from Step 1
API Key — the refresh token from Step 2
Click Save
PGP will validate your credentials by testing the token exchange and confirming API access to your projects. Once saved, the integration runs on a regular schedule, automatically importing new scan results.
Step 4: Verify
After the next integration run, check Assets for repository entries that correspond to your Checkmarx projects
Check Risks and filter by source to see findings imported from Checkmarx
If expected data is missing, see the Troubleshooting section below
Troubleshooting
Security and Data Handling
PGP uses your API key only to obtain an access token and call the Checkmarx REST API — it does not modify any data in Checkmarx
Credentials are encrypted at rest and in transit within your PGP deployment
Only finding metadata is imported (descriptions, severity, file locations, package info) — full source code is never pulled into PGP