Skip to main content
availability

Package: Invicti AppSec Enterprise (on-premise, on-demand)

Orca Security CSPM Integration

Orca Security provides agentless cloud security posture management, detecting misconfigurations, vulnerabilities, and compliance violations across cloud environments. In Invicti AppSec, the Orca Security integration connects to your Orca account to import cloud security findings into your projects.

Prerequisites

FieldDescription
UsernameOrca Security API username
PasswordOrca Security API password
API URLBase URL of your Orca Security API endpoint

Get API Credentials (on Orca Side)

  1. Log in to the Orca Security console.
  2. Navigate to Settings > Users or API Access.
  3. Create a dedicated API user or generate API credentials.
  4. Copy the Username, Password, and note the API URL for your Orca instance.

Step 1: Navigate to Integrations

From the left sidebar menu, click on Integrations.

Step 2: Select the CSPM Tab

On the Integrations > Scanners page, click on the CSPM tab.

  CSPM tab

Step 3: Find and Activate Orca Security

Scroll through the list of CSPM scanners to find Orca Security.

  • If Orca Security is not activated, click the Activate button to enable the integration.

Step 4: Configure Connection Settings

Click the gear icon on the Orca Security card to open the settings panel. Fill in the required fields:

FieldDescriptionRequired
UsernameOrca Security API usernameYes
PasswordOrca Security API passwordYes
API URLBase URL of your Orca Security instanceYes

  Orca Security settings

Step 5: Test the Connection

Click Test Connection. A green Connection successful message confirms that Invicti AppSec can authenticate with the Orca Security API.

Summary

StepAction
1Navigate to Integrations from the sidebar
2Select the CSPM tab
3Activate Orca Security
4Enter Username, Password, and API URL
5Test the connection

Create a Scan

  1. Open a project in Invicti AppSec.
  2. Go to Settings > Scanners.
  3. Click Add Scanner.

Add Orca Security Scanner

  1. Select CSPM as the scanner type.
  2. Choose Orca Security from the scanner list.
  3. Click Add to open the scan configuration drawer.

Scan Configuration Fields

FieldDescriptionRequired
EnvironmentAssociate the scan with a feature environmentNo
BranchThe branch to associate cloud findings withYes
Meta DataAdditional metadata to tag the scanNo
Scan TagFree-text tag to identify or group scansNo
Cloud FilterFilter imported findings by Asset Name, Image, Region, Platform, Asset Type, Severity, or IP AddressNo
  • Invicti AppSec automatically syncs Orca Security vulnerabilities on a daily basis — no manual trigger is required after the initial scan is configured.

  • Cloud Filter lets you narrow which findings are imported into this project. You can filter by Asset Name, Image, Region, Cloud Platform, Asset Type, Severity, and IP Address. If no filter is set, all findings accessible via the API credentials are imported.

  Orca Security scan creation

Scheduler

Enable the Scheduler toggle to automatically re-run the Orca Security scan on a recurring schedule.

Webhook (Optional)

Add a webhook URL to receive scan completion notifications.

KDT Command

kdt scan -p <project_name> -t orcacspm -b <branch_name>

Troubleshooting

Connection Fails

IssueResolution
Invalid credentialsVerify the username and password in the Orca Security console.
Incorrect API URLEnsure the API URL points to your Orca instance (e.g., https://api.orcasecurity.io). Check your Orca account settings for the correct endpoint.
UnauthorizedConfirm the API user has sufficient read permissions for cloud security findings.

Scan Issues

IssueResolution
No findings importedVerify Orca Security has completed assessments for your cloud accounts. Check the Cloud Filter — overly restrictive filters may exclude all findings.
Scan not startingVerify the scanner is activated and the connection test passes in the integration settings.

Best Practices

  • Use a dedicated API user for Invicti AppSec with read-only access — do not use admin credentials.
  • Use Cloud Filters to associate each project with specific asset types, regions, or cloud platforms it covers, ensuring findings are relevant to that project.
  • Use the Scheduler to keep cloud security findings aligned with Orca's assessment schedule.
  • Rotate credentials periodically and update the integration settings in Invicti AppSec accordingly.

Limitations

  • Orca Security CSPM in Invicti AppSec imports cloud security posture findings — it does not trigger new Orca assessments.
  • Only findings accessible via the provided API credentials are available for import.
  • Vulnerability sync occurs daily automatically; manual on-demand sync is not supported outside of scheduled scans.
  • Requires an active Orca Security subscription.

Need help?

Invicti Support team is ready to provide you with technical help. Go to Help Center

Was this page useful?