Cymulate
Overview
The Cymulate integration connects the Praetorian Guard Platform (PGP) with the Cymulate Breach and Attack Simulation (BAS) platform, importing assessment results, security control gap analysis, and exposure scores into PGP. Cymulate tests your security controls by simulating real-world attack techniques across the kill chain — email, web gateway, endpoint, lateral movement, and data exfiltration. By importing these results into PGP, you can correlate simulated attack outcomes with your actual attack surface, identifying where your defenses are weakest.
This integration is designed for organizations that run Cymulate BAS assessments and want to incorporate the results into their continuous threat exposure management workflow. Instead of viewing BAS results in isolation, PGP surfaces control gaps and failed simulations alongside your real-world vulnerability data, enabling security teams to prioritize remediation based on both theoretical and actual exposure.
What the Integration Does
When connected, PGP performs a read-only import from the Cymulate API:
Assessment Results as Risks: Results from Cymulate attack simulations — including which attack vectors succeeded, which controls blocked them, and the overall success rate — are imported as risk findings in PGP. Each finding includes the attack technique, the targeted control, and the outcome.
Security Control Gaps: When a simulated attack bypasses a security control, PGP records the gap as a risk finding associated with the relevant asset or control category. This highlights where your defenses need strengthening.
Exposure Scores: Cymulate's overall exposure scores and per-module scores (email security, web gateway, endpoint, etc.) are imported as posture metrics, giving you a quantitative measure of your security control effectiveness.
Attack Simulation Metadata: Details about each simulation, including the MITRE ATT&CK technique mapped, the simulation date, and the targeted environment, are captured for audit and trend analysis.
Data flows one direction only — from Cymulate into PGP. The integration never writes back to Cymulate, triggers simulations, or modifies any configuration.
Prerequisites
Before setting up the integration, you need Cymulate API credentials:
Log in to the [Cymulate platform](https://app.cymulate.com)
Navigate to Settings > API Keys
Click Generate API Key
Record the following value:
API Key: The secret key for authenticating API requests
Ensure the API key has read-only permissions to assessment results and reports
The API key must have sufficient scope to read assessment data, simulation results, and exposure scores from your Cymulate tenant.
Setup
Go to Integrations, then Breach and Attack Simulation, then Cymulate in the Guard Platform
Enter your Cymulate API key in the setup form
Click Connect — PGP will validate your credentials by attempting to fetch assessment data before saving
If validation fails, verify that your API key is active and has read permissions for assessment and report data.
What Data Is Synced
Assessment Results
Cymulate assessment outcomes are imported as risk findings:
Finding name: Attack technique or scenario name from the simulation
Severity: Mapped from Cymulate's assessment outcome (failed control = high/critical, partially blocked = medium)
MITRE ATT&CK mapping: The technique ID and tactic associated with the simulation
Control tested: The security control category that was evaluated
Outcome: Blocked, partially blocked, or bypassed
Exposure Scores
Per-module and overall exposure scores are imported as posture metrics:
Security Control Gaps
Gaps identified when simulated attacks bypass controls:
Gap description: What the control failed to detect or block
Attack vector: The simulated attack technique that succeeded
Affected module: The security control category where the gap exists
Recommendation: Cymulate's remediation guidance for closing the gap
API Endpoints Used
Base URL: https://api.cymulate.com
All requests are authenticated using the API key passed in the request header over HTTPS.
Troubleshooting
Security and Data Handling
Read-only access: The integration only reads assessment results and exposure data from Cymulate. It never triggers simulations, modifies configurations, or deletes any data in the Cymulate platform.
Credential handling: Your API key is stored as an encrypted credential within PGP and is never exposed in logs or the UI after initial entry.
Authentication: The API key is transmitted over HTTPS in request headers for every API call.
Data filtering: Imported findings and metrics pass through PGP standard filtering rules, allowing you to control which assessment results are included in your risk view.