CyCognito Connector

The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the Tenable FedRAMP Product Offering.

The CyCognito platform discovers and tests all assets discoverable via the internet. This process finds previously unknown assets unmonitored and exposed to attack. The platform continuously monitors and tests all assets associated with an organization.

Tip: For more information on how third-party integrations work, see Connectors.

Connector Details

Details Description

Supported products

CyCognito

Category

DAST

Ingested data

Assets and Findings

Ingested Asset Classes

Web Application

Integration type

UNI directional (data is transferred from the Connector to Tenable Exposure Management in one direction)

Supported version and type

SaaS (latest)

Prerequisites and User Permissions

Before you begin configuring the connector, make sure you have the following:

  • CyCognito user with the necessary permissions to generate and manage API keys within the CyCognito platform.

  • Know your CyCognito platform URL

  • Generate a CyCognito API Key

Generate a CyCognito API Key

  1. In your CyCognito Platform, navigate to Workflow & Integration

  2. Click API Key Management.

  3. Type a Key Name.

  4. Click Create.

  5. Save the resulting API key for later use within in Tenable Exposure Management.

Add a Connector

To add a new connector:

  1. In the left navigation menu, click Connectors.

    The Connectors page appears.

  2. In the upper-right corner, click Add new connector.

    The Connector Library appears.

  3. In the search box, type the name of the connector.

  4. On the tile for the connector, click Connect.

    The connector configuration options appear.

Configure the Connector

To configure the connector:

  1. (Optional) In the Connector's Name text box, type a descriptive name for the connector.

  2. From the Platform URL drop-down, select the Cycognito platform URL to use for the connector.

  3. In the API Key text box, paste the API key you generated earlier.

  4. In the Data pulling configuration section, you can configure dynamic settings specific to the connector.

    • In the Cycognito asset types to fetch section, select the check boxes next to the asset types you want to ingest from Cycognito:

      • Web Applications

      • Domains

      • IP Addresses

    • In the Asset Retention text box, type the number of days after which you want assets to be removed from Tenable Exposure Management. If an asset has not been detected or updated within the specified number of days, it is automatically removed from the application, ensuring your asset inventory is current and relevant.

      Tip: For more information, see Asset Retention.
    • For the Immediately remove assets when their status is option, choose to automatically remove assets that reach a certain asset status, for example, Removed.

  5. In the Test connectivity section, click the Test Connectivity button to verify that Tenable Exposure Management can connect to your connector instance.

    • A successful connectivity test confirms that the platform can connect to the connector instance. It does not, however, guarantee that the synchronization process will succeed, as additional syncing or processing issues may arise.

    • If the connectivity test fails, an error message with details about the issue appears. Click Show tests for more information about the exact error.

  6. In the Connector scheduling section, configure the time and day(s) on which you want connector syncs to occur.

    Tip: For more information, see Connector Scheduling
  7. Click Create. Tenable Exposure Management begins syncing the connector. The sync can take some time to complete.

  8. To confirm the sync is complete, do the following:

CyCognito in Tenable Exposure Management

Locate Connector Assets in Tenable Exposure Management

As the connector discovers assets, Tenable Exposure Management ingests those devices for reporting.

To view assets by connector:

  1. In Tenable Exposure Management, navigate to the Assets page.

  2. In the Filters section, under 3rd Party Connectors, click the connector name for which you want to view assets.

    The asset list updates to show only assets from the selected connector.

  3. Click on any asset to view Asset Details.

Locate Connector Weaknesses in Tenable Exposure Management

As the connector discovers weaknesses, Tenable Exposure Management ingests those weaknesses for reporting.

To view weaknesses by connector: 

  1. In Tenable Exposure Management, navigate to the Weaknesses page.

  2. In the Filters section, under 3rd Party Connectors, click the connector name for which you want to view weaknesses.

    The weaknesses list updates to show only weaknesses from the selected connector.

  3. Click on any weakness to view Weakness Details.

Locate Connector Findings in Tenable Exposure Management

As the connector discovers individual findings, Tenable Exposure Management ingests those findings for reporting.

To view findings by connector:

  1. In Tenable Exposure Management, navigate to the Findings page.

  2. In the Filters section, under 3rd Party Connectors, click the connector name for which you want to view findings

    The findings list updates to show only assets from the selected connector.

  3. Click on any asset to view Finding Details.

API Endpoints in Use

API version: v1

https://api.platform.cycognito.com/v1/assets/ip

Test Connectivity

https://api.platform.cycognito.com/v1/issues

Test Connectivity

https://api.platform.cycognito.com/v1/export/request/webapp

Generate asset report

https://api.platform.cycognito.com/v1/export/request/domain Generate asset report
https://api.platform.cycognito.com/v1/export/request/ip Generate asset report
https://api.platform.cycognito.com/v1/export/get Get reports, Assets
https://api.platform.cycognito.com/v1/issues

Findings

Detections