Orca Security CSPM Integration

Orca Security provides agentless cloud security posture management, detecting misconfigurations, vulnerabilities, and compliance violations across cloud environments. In Invicti ASPM, the Orca Security integration connects to your Orca account to import cloud security findings into your projects.

Prerequisites

Orca Security supports two authentication methods. Use one of the following:

Option A — Username & Password

FieldDescription
UsernameOrca Security API username (email address)
PasswordOrca Security API password
API URLBase URL of your Orca Security API endpoint

Option B — API Token

FieldDescription
TokenOrca Security API token
API URLBase URL of your Orca Security API endpoint
📘

If both a token and username/password are provided, the token takes precedence.


How to Get API Credentials (on Orca Side)

For username/password authentication:

  1. Log in to the Orca Security console.
  2. Navigate to Settings > Users or API Access.
  3. Create a dedicated API user or generate API credentials.
  4. Copy the Username, Password, and note the API URL for your Orca instance.

For token authentication:

  1. Log in to the Orca Security console.
  2. Navigate to Settings > API or Integrations.
  3. Generate an API token.
  4. Copy the token and note the API URL for your Orca instance.

Step 1: Navigate to Integrations

From the left sidebar menu, click on Integrations.

Step 2: Select the CSPM Tab

On the Integrations > Scanners page, click on the CSPM tab.

CSPM tab

Step 3: Find and Activate Orca Security

Scroll through the list of CSPM scanners to find Orca Security.

  • If Orca Security is not activated, click the Activate button to enable the integration.

Step 4: Configure Connection Settings

Click the gear icon on the Orca Security card to open the settings panel. Fill in the required fields:


Username & Password authentication:

FieldDescriptionRequired
UsernameOrca Security API username (email address)Yes
PasswordOrca Security API passwordYes
API URLBase URL of your Orca Security instanceYes

Token authentication:

FieldDescriptionRequired
TokenOrca Security API tokenYes
API URLBase URL of your Orca Security instanceYes
Orca Security settings

Step 5: Test the Connection

Click Test Connection. A green Connection successful message confirms that Invicti ASPM can authenticate with the Orca Security API.

Summary

StepAction
1Navigate to Integrations from the sidebar
2Select the CSPM tab
3Activate Orca Security
4Enter API URL and credentials (username/password or API token)
5Test the connection

How to Create a Scan

Navigate to Project Scanners

  1. Open a project in Invicti ASPM.
  2. Go to Settings > Scanners.
  3. Click Add Scanner.

Add Orca Security Scanner

  1. Select CSPM as the scanner type.
  2. Choose Orca Security from the scanner list.
  3. Click Add to open the scan configuration drawer.

Scan Configuration Fields

FieldDescriptionRequired
EnvironmentAssociate the scan with a feature environmentNo
BranchThe branch to associate cloud findings withYes
Meta DataAdditional metadata to tag the scanNo
Scan TagFree-text tag to identify or group scansNo
Cloud FilterFilter imported findings by Asset Name, Image, Region, Platform, Asset Type, Severity, or IP AddressNo

Invicti ASPM automatically syncs Orca Security vulnerabilities on a daily basis — no manual trigger is required after the initial scan is configured.

Cloud Filter lets you narrow which findings are imported into this project. You can filter by Asset Name, Image, Region, Cloud Platform, Asset Type, Severity, and IP Address. If no filter is set, all findings accessible via the API credentials are imported.

Orca Security scan creation

Scheduler

Enable the Scheduler toggle to automatically re-run the Orca Security scan on a recurring schedule.

Webhook (Optional)

Add a webhook URL to receive scan completion notifications.

KDT Command

kdt scan -p <project_name> -t orcacspm -b <branch_name>

Imported Vulnerability Data

For each finding imported from Orca Security, Invicti ASPM captures the following data:

FieldSourceDescription
NameOrca finding nameVulnerability title
SeverityOrca vendor severityMapped to ASPM severity levels
CVSSv3 ScoreOrca scoreUsed if available; falls back to severity-based mapping
CVEOrca CVE fieldAssociated CVE identifier, if any
PathAsset name or location pathAffected asset name, or specific file/path within the asset if available
DescriptionOrca description + remediationCombined into the vulnerability description
Portal URLOrca portal linkDirect link to the finding in the Orca console
Fixed VersionOrca fixed versionPackage or component version where the issue is resolved
StatusOrca vulnerability statusReflects the finding's current state in Orca
Detection MethodOrca detection methodAutomatically added as a tag on the vulnerability
Internet ExposureLimited or wide internet exposure flagRecorded on the cloud asset metadata
Asset Name / Type / RegionOrca asset metadataCloud asset details associated with the finding
Cloud PlatformOrca asset cloud platforme.g., AWS, Azure, GCP
Subscription IDOrca asset subscriptionCloud account/subscription identifier
OSOrca asset operating systemOperating system of the affected host
IP AddressesOrca asset IP addressesNetwork addresses of the affected asset
Image IDOrca asset image IDContainer image identifier, if applicable
RuntimeOrca asset runtimeContainer runtime, if applicable
📘

Exploit detection: If Orca marks a finding as having a known exploit (HasExploit = true), Invicti ASPM automatically sets the vulnerability as True Positive (TP).

Troubleshooting

Connection Fails

IssueResolution
Invalid credentialsVerify the username and password in the Orca Security console.
Invalid tokenEnsure the API token is still active and has not been revoked in the Orca console.
Incorrect API URLEnsure the API URL points to your Orca instance (e.g., https://api.orcasecurity.io). Check your Orca account settings for the correct endpoint.
UnauthorizedConfirm the API user or token has sufficient read permissions for cloud security findings.

Scan Issues

IssueResolution
No findings importedVerify Orca Security has completed assessments for your cloud accounts. Check the Cloud Filter — overly restrictive filters may exclude all findings.
Scan not startingVerify the scanner is activated and the connection test passes in the integration settings.

Best Practices

  • Use a dedicated API user for Invicti ASPM with read-only access — do not use admin credentials.
  • Use Cloud Filters to associate each project with specific asset types, regions, or cloud platforms it covers, ensuring findings are relevant to that project.
  • Use the Scheduler to keep cloud security findings aligned with Orca's assessment schedule.
  • Rotate credentials periodically and update the integration settings in Invicti ASPM accordingly.

Limitations

  • Orca Security CSPM in Invicti ASPM imports cloud security posture findings — it does not trigger new Orca assessments.
  • Only findings accessible via the provided API credentials are available for import.
  • Vulnerability sync occurs daily automatically; manual on-demand sync is not supported outside of scheduled scans.
  • Requires an active Orca Security subscription.