SafeBreach
Overview
The SafeBreach integration connects the Praetorian Guard Platform (PGP) with SafeBreach's breach and attack simulation (BAS) platform, importing simulation results, attack scenarios, and security gap analysis into your attack surface view. SafeBreach continuously tests your security controls by executing real attack methods across the kill chain, identifying where defenses succeed and where gaps exist.
By connecting SafeBreach to PGP, you can correlate simulated attack results with your real attack surface data. When SafeBreach identifies a security control gap -- such as a failed block of lateral movement or data exfiltration -- PGP maps that gap to the affected assets and risks in your environment, giving you a prioritized view of which vulnerabilities are most likely to be exploitable given your current defensive posture.
This integration operates in a read-only capacity. PGP queries the SafeBreach API to retrieve simulation results and security posture data but never executes simulations, modifies playbooks, or changes any configuration in your SafeBreach environment.
---
What the Integration Does
When enabled, PGP connects to the SafeBreach Management API and performs the following:
Simulation results -- Retrieves the outcomes of attack simulations, including which scenarios were blocked, detected, or missed by your security controls.
Security gaps -- Imports identified control gaps where attacks were not blocked or detected, mapped to MITRE ATT&CK techniques and tactics.
Attack scenarios -- Captures details of the simulated attack methods, including the attack type, kill chain phase, and targeted security control.
Risk correlation -- Maps SafeBreach findings to PGP assets based on the simulators (network endpoints) involved in each test, enabling you to see which assets have validated defensive gaps.
All data flows one direction: from SafeBreach into PGP. Simulation failures and security gaps become PGP risks, and simulator endpoints are correlated to PGP assets for a combined view of theoretical vulnerabilities and validated control gaps.
---
Prerequisites
Before setting up the integration, ensure you have:
An active SafeBreach deployment (cloud or on-premises management console)
A SafeBreach API key with read access to simulation data
At least one completed simulation plan with results in your SafeBreach console
Deployed simulators (attack and target nodes) that have executed tests
Generating an API Key
Log in to the SafeBreach Management Console
Navigate to Settings > API Keys
Click Generate API Key
Name the key (e.g.,
PGP Integration) and set permissions to Read OnlyCopy the generated API key and the Account ID displayed on the settings page
Store both values securely
---
Setup
In PGP, go to Integrations and locate SafeBreach (under Breach and Attack Simulation)
Enter the required credentials
Click Connect -- PGP will validate the API key and account ID before saving
Field Reference
Once connected, PGP will begin syncing simulation results on its regular integration schedule.
---
What Data Is Synced
Simulation Results
Results from completed attack simulations are imported into PGP.
Security Gaps
Control failures identified by SafeBreach are imported as risks.
Simulator Endpoints (Assets)
SafeBreach simulators are mapped to PGP assets where possible.
---
API Endpoints Used
PGP uses the SafeBreach Management REST API. All requests use API key authentication and are read-only (GET).
All API requests include the Authorization: Bearer {api_key} header for authentication.
---
Troubleshooting
---
Security and Data Handling
Read-only access -- PGP only performs GET requests against the SafeBreach API. It never executes simulations, modifies playbooks, or changes any configuration in your SafeBreach environment.
Credential storage -- Your SafeBreach API key and Account ID are encrypted at rest and never exposed in logs or API responses.
Token-based authentication -- The API key is sent via the
Authorization: Bearerheader over HTTPS for all requests.Data residency -- Imported simulation results and gap analysis data is stored within your PGP tenant and subject to your organization's data retention policies.
Minimal permissions -- Only read-level API access is required. We recommend creating a dedicated API key with read-only permissions for the PGP integration.
Sensitive data -- SafeBreach simulation results may contain details about attack techniques and control weaknesses. PGP stores this data with the same security controls applied to all risk data in your tenant.