Overview

The Cymulate integration connects the Praetorian Guard Platform (PGP) with the Cymulate Breach and Attack Simulation (BAS) platform, importing assessment results, security control gap analysis, and exposure scores into PGP. Cymulate tests your security controls by simulating real-world attack techniques across the kill chain — email, web gateway, endpoint, lateral movement, and data exfiltration. By importing these results into PGP, you can correlate simulated attack outcomes with your actual attack surface, identifying where your defenses are weakest.

This integration is designed for organizations that run Cymulate BAS assessments and want to incorporate the results into their continuous threat exposure management workflow. Instead of viewing BAS results in isolation, PGP surfaces control gaps and failed simulations alongside your real-world vulnerability data, enabling security teams to prioritize remediation based on both theoretical and actual exposure.

What the Integration Does

When connected, PGP performs a read-only import from the Cymulate API:

  • Assessment Results as Risks: Results from Cymulate attack simulations — including which attack vectors succeeded, which controls blocked them, and the overall success rate — are imported as risk findings in PGP. Each finding includes the attack technique, the targeted control, and the outcome.

  • Security Control Gaps: When a simulated attack bypasses a security control, PGP records the gap as a risk finding associated with the relevant asset or control category. This highlights where your defenses need strengthening.

  • Exposure Scores: Cymulate's overall exposure scores and per-module scores (email security, web gateway, endpoint, etc.) are imported as posture metrics, giving you a quantitative measure of your security control effectiveness.

  • Attack Simulation Metadata: Details about each simulation, including the MITRE ATT&CK technique mapped, the simulation date, and the targeted environment, are captured for audit and trend analysis.

Data flows one direction only — from Cymulate into PGP. The integration never writes back to Cymulate, triggers simulations, or modifies any configuration.

Prerequisites

Before setting up the integration, ensure you have:

  • An active Cymulate subscription with admin access to generate API tokens

  • A Cymulate API token with read access to Findings and (if importing assets) Attack Surface Management assessments

Generating a Cymulate API Token

  • Log in to the Cymulate console at https://app.cymulate.com

  • Navigate to Settings > API Keys (or Account > API)

  • Click Add API Key (or Generate Token)

  • Give the token a descriptive name (e.g., "Praetorian Guard Integration")

  • Copy the generated token -- it is only shown once at creation time

Setup

  • In PGP, go to Integrations and click Add Integration

  • Select Cymulate (under Breach and Attack Simulation)

  • Enter the API token and choose your import preferences

  • Click Connect -- PGP will validate your credentials by attempting to fetch assessment data before saving

Field Reference

Field

Description

Required

API Token

The API token generated from Cymulate's Settings > API Keys page

Yes

Import Vulnerabilities

Import findings (CVEs, risks, MITRE-mapped techniques) from Cymulate assessments (on by default)

No

Import Assets

Import external-facing assets discovered by Cymulate's Attack Surface Management module (off by default)

No

If validation fails, verify that your API token is active and has read permissions for assessment and report data.

Permissions

The Cymulate API token inherits the permissions of the account that created it. For this integration, the token needs read access to:

  • Findings -- used for credential validation and importing vulnerabilities

  • Attack Surface Management (ASM) assessments -- used for importing assets

A user with a standard admin or read-only role is sufficient. If your Cymulate deployment supports scoped API tokens, grant the minimum read-only scopes listed above.

What Data Is Synced

Assessment Results

Cymulate assessment outcomes are imported as risk findings:

  • Finding name: Attack technique or scenario name from the simulation

  • Severity: Mapped from Cymulate's assessment outcome (failed control = high/critical, partially blocked = medium)

  • MITRE ATT&CK mapping: The technique ID and tactic associated with the simulation

  • Control tested: The security control category that was evaluated

  • Outcome: Blocked, partially blocked, or bypassed

Exposure Scores

Per-module and overall exposure scores are imported as posture metrics:

Cymulate Module

PGP Mapping

Email Security

Exposure score metric

Web Gateway

Exposure score metric

Web Application Firewall

Exposure score metric

Endpoint Security

Exposure score metric

Lateral Movement

Exposure score metric

Data Exfiltration

Exposure score metric

Overall Exposure Score

Aggregate posture metric

Security Control Gaps

Gaps identified when simulated attacks bypass controls:

  • Gap description: What the control failed to detect or block

  • Attack vector: The simulated attack technique that succeeded

  • Affected module: The security control category where the gap exists

  • Recommendation: Cymulate's remediation guidance for closing the gap

API Endpoints Used

Endpoint

Method

Purpose

/api/v1/assessments

GET

Fetch list of completed assessments

/api/v1/assessments/{id}/results

GET

Fetch detailed results for a specific assessment

/api/v1/exposure-score

GET

Fetch overall and per-module exposure scores

/api/v1/assessments/{id}/attacks

GET

Fetch individual attack simulation outcomes

/api/v1/reports/executive

GET

Fetch executive summary with control gap analysis

Base URL: https://api.cymulate.com

All requests are authenticated using the API key passed in the request header over HTTPS.

Troubleshooting

Issue

Cause

Fix

Validation fails on connect

API key is incorrect or expired

Regenerate the API key in Cymulate under Settings > API Keys

No findings appearing

No assessments have been completed in Cymulate

Run at least one assessment in Cymulate before syncing

Missing exposure scores

Assessment modules have not been configured

Configure and run the relevant Cymulate modules (email, web gateway, endpoint, etc.)

Stale results

No recent assessments have been executed

Run new assessments in Cymulate to generate fresh results

Partial results

API key lacks access to all assessment modules

Verify the API key scope covers all Cymulate modules in your license

Connection timeout

Network or firewall blocking outbound requests

Verify that PGP can reach api.cymulate.com over HTTPS (port 443)

Security and Data Handling

  • Read-only access: The integration only reads assessment results and exposure data from Cymulate. It never triggers simulations, modifies configurations, or deletes any data in the Cymulate platform.

  • Credential handling: Your API key is stored as an encrypted credential within PGP and is never exposed in logs or the UI after initial entry.

  • Authentication: The API key is transmitted over HTTPS in request headers for every API call.

  • Data filtering: Imported findings and metrics pass through PGP standard filtering rules, allowing you to control which assessment results are included in your risk view.