Orca Security
Overview
The Orca Security integration connects the Praetorian Guard Platform (PGP) with your Orca Security environment, importing cloud security alerts as risks and mapping the underlying cloud resources as assets. Orca provides agentless cloud security across AWS, Azure, GCP, and Kubernetes — and this integration brings that visibility directly into PGP so your cloud-managed resources and their security findings are tracked alongside the rest of your attack surface.
This is especially valuable for organizations using Orca as their Cloud Security Posture Management (CSPM) platform. Rather than manually reconciling security findings between Orca and PGP, the integration automatically surfaces alerts and their associated cloud assets, closing gaps in your attack surface coverage and consolidating risk visibility in a single pane of glass.
What the Integration Does
The integration is read-only: PGP queries the Orca Serving Layer API and imports alerts as risks and their associated cloud resources as assets. It does not modify any configuration, alerts, or policies in Orca.
How it works:
Authentication — PGP authenticates to the Orca Serving Layer API using the API token you provide, passed via the
Authorization: Token {token}header over HTTPS.Alert ingestion — PGP queries the
/api/serving-layer/queryendpoint to retrieve open and in-progress alerts across Critical, High, Medium, and Low risk levels. Vulnerability-type alerts (Vulnerable Software, Service Vulnerability) are excluded as they represent dependency/SBOM findings rather than posture issues.Asset mapping — Each alert's underlying cloud resource is mapped to a typed PGP asset based on its cloud provider and resource type. The integration recognizes 60+ resource types across AWS, Azure, GCP, and Kubernetes.
Risk creation — Each alert is converted to a PGP risk with severity mapped from the Orca score or risk level. A proof file with full alert metadata is attached for evidence.
Affiliation tracking — On subsequent runs, PGP reconciles the current Orca state, detecting changes in alert status and asset presence.
Discovered Asset Types
The integration maps cloud resources from four platforms into PGP assets:
AWS (30+ types)
Azure (6 types)
GCP (16 types)
Kubernetes (11 types)
For unmapped resource types, the integration creates a generic asset using the Orca vendor ID or a constructed ARN.
Detected Risks
Risks are created from Orca alerts with the naming convention {AlertType}-orca (e.g., MissingFirewall-orca, UnencryptedTraffic-orca). Common alert categories include:
Severity Mapping
Risk severity is determined from the Orca alert data using two methods:
Orca Score (preferred, if > 0) — Numeric score mapped to CVSS-equivalent severity
Risk Level (fallback) — Direct mapping: Critical → Critical, High → High, Medium → Medium, Low → Low
Informational-level alerts are excluded from import.
Prerequisites
An Orca Security account with access to the Serving Layer API
An API token with read access to alerts and assets
Your Orca regional URL (e.g.,
https://app.eu.orcasecurity.io)
Creating an API Token
Log in to the Orca Security dashboard
Navigate to Settings > Users & Permissions > API
Click Create API Token
Assign a descriptive name (e.g., "PGP Integration")
Copy the token — it is displayed only once
Finding Your Regional URL
Your regional URL is the base URL you use to access the Orca dashboard. Common examples:
PGP automatically normalizes regional URL variants (e.g., eu.app.orcasecurity.io is converted to app.eu.orcasecurity.io).
Setup
In PGP, navigate to Integrations and locate Orca Security under the CSPM category.
Click Integrate.
Enter the following fields and click Connect.
PGP validates your credentials by making a lightweight test call to GET /api/serving-layer/schema.
What Data Is Synced
Alerts to PGP Risks
Open and in-progress alerts at Critical, High, Medium, and Low risk levels are imported as risks
Each risk includes the alert type, category, description, recommendation, and associated cloud account
A proof file with full alert metadata is attached for evidence and traceability
Vulnerability-type alerts (Vulnerable Software, Service Vulnerability) are excluded to avoid SBOM/dependency noise
Cloud Resources to PGP Assets
Each alert's underlying cloud resource is mapped to a typed PGP asset (60+ types across AWS, Azure, GCP, Kubernetes)
Assets are tagged with the
orcacloud service identifierFor AWS resources, full ARNs are constructed where possible for precise identification
Unmapped resource types fall back to generic assets using the Orca vendor ID
Orca API Endpoints Used
Troubleshooting
Security and Data Handling
Token-based authentication (
Authorization: Token) over HTTPS, never loggedAPI token encrypted at rest and in transit within your PGP deployment
Entirely read-only — PGP never modifies alerts, assets, policies, or any configuration in Orca
Only alert metadata is imported (type, severity, description, recommendation) — no raw scan data, logs, or credentials are accessed
Alert processing runs with concurrency limits (10 goroutines) to avoid overloading the Orca API
Integration category: CSPM. Data direction: Read-only (Orca to PGP). Authentication: API token via Authorization header.