CyCognito
CyCognito
Overview
The CyCognito integration connects the Praetorian Guard Platform (PGP) with the CyCognito external attack surface management platform, importing discovered external assets and security issues directly into your PGP attack surface inventory. CyCognito autonomously maps your organization's internet-exposed assets using attacker-perspective reconnaissance — PGP imports these discoveries so they can be correlated with your broader security posture and continuously tested.
This integration is ideal for organizations that use CyCognito to discover and monitor their external attack surface. Rather than managing CyCognito findings in isolation, PGP consolidates the discovered assets and issues alongside data from your other security tools, giving you a unified view of your exposure. Assets discovered by CyCognito — including domains, IPs, web applications, certificates, and cloud resources — feed directly into PGP's continuous threat exposure management pipeline.
What the Integration Does
When connected, PGP performs a read-only import from the CyCognito API:
External Assets: Domains, IP addresses, web applications, certificates, and cloud resources discovered by CyCognito are imported as PGP assets. Each asset includes metadata such as hosting provider, technology stack, geographic location, and business unit attribution.
Security Issues as Risks: Security issues identified by CyCognito — such as exposed services, misconfigurations, vulnerable software, and certificate problems — are imported as risks associated with the corresponding PGP assets.
Asset Metadata and Context: CyCognito's asset context, including discoverability score, attractiveness rating, and organization attribution, is captured as metadata to enrich PGP's risk prioritization.
Domains and Subdomains as Seeds: Discovered domains and subdomains are imported as PGP seeds, feeding the broader discovery pipeline.
Data flows one direction only — from CyCognito into PGP. The integration never writes back to CyCognito or modifies any data in the CyCognito platform.
Prerequisites
Before setting up the integration, ensure you have:
An active CyCognito subscription and a user account with permission to generate API keys
Your CyCognito API base URL (depends on which region your tenant is hosted in)
A CyCognito API key with read access to realm, assets, and issues
Finding Your CyCognito API Base URL
Your CyCognito API base URL depends on which region your tenant is hosted in. Most tenants use:
General:
https://api.platform.cycognito.comUS region:
https://api.us-platform.cycognito.com
If you're unsure which applies to your account, check your CyCognito console under Settings > API, review your account onboarding documentation, or contact your CyCognito administrator.
Generating an API Key
Log in to the CyCognito console
Navigate to Settings > API Keys (or follow the official guide at https://docs.cycognito.com/docs/api-key)
Click Generate (or Add API Key)
Give the key a descriptive name (e.g., "Praetorian Guard Integration")
Copy the generated API key -- it is only shown once at creation time
Setup
In PGP, go to Integrations and click Add Integration
Select CyCognito (under Cyber Asset Attack Surface Management)
Enter the required credentials and choose your import preferences
Click Connect -- PGP will validate your credentials by attempting to fetch asset data before saving
Field Reference
If validation fails, verify that your API key is active and has the correct read permissions.
Permissions
The CyCognito API key inherits the permissions of the account that created it. For this integration, the key needs read access to:
Realm -- used for credential validation
Assets -- used for importing assets
Issues -- used for importing vulnerabilities
A read-only role is sufficient; no write or admin permissions are required.
What Data Is Synced
External Assets
CyCognito-discovered assets are imported with:
Asset name: Derived from the asset identifier (domain, IP, application URL)
Asset type: Mapped from CyCognito's asset classification (domain, IP address, web application, certificate, cloud resource)
Metadata: Hosting provider, technology stack, geographic location, business unit, discoverability score, attractiveness rating, and last observed timestamp
Security Issues
Issues identified by CyCognito are imported as risks:
Discovered Domains and Seeds
Domains and subdomains found through CyCognito reconnaissance are imported as seeds:
Domain name: The discovered domain or subdomain
Source: Tagged as discovered via CyCognito
Attribution: Business unit or subsidiary association from CyCognito
API Endpoints Used
Base URL: Your CyCognito API base URL (e.g., https://api.platform.cycognito.com or https://api.us-platform.cycognito.com)
All requests are authenticated using the API token passed as a Bearer token in the Authorization header over HTTPS.
Troubleshooting
Security and Data Handling
Read-only access: The integration only reads data from CyCognito. It never creates, modifies, or deletes assets, issues, or configurations in the CyCognito platform.
Credential handling: Your API token is stored as an encrypted credential within PGP and is never exposed in logs or the UI after initial entry.
Authentication: The API token is transmitted as a Bearer token in the Authorization header over HTTPS for every API call.
Data filtering: Imported assets and risks pass through PGP standard filtering rules, allowing you to control which CyCognito discoveries are included in your attack surface.