Stellar Cyber API Integration Guide
Last updated: December 17, 2025
The Stellar Cyber integration allows Cyrisma vulnerability data to be ingested into the Stellar Cyber platform for centralized detection, investigation, and correlation. This integration is implemented using the Cyrisma connector within Stellar Cyber and leverages Cyrisma’s reporting APIs to securely collect vulnerability data across managed customer environments.
This article explains what the integration does, what data is shared, and how the integration behaves, without duplicating Stellar Cyber’s connector configuration documentation.
Overview
The Stellar Cyber integration enables one-way data collection from Cyrisma into Stellar Cyber.
Key characteristics:
Data flows from Cyrisma to Stellar Cyber
The integration is read-only
No response or remediation actions are triggered from Stellar Cyber
Data is ingested into the Stellar Cyber data lake for analysis and correlation
This integration is designed for MSSPs and SOC teams that want Cyrisma vulnerability findings available alongside other security telemetry.
Integration Capabilities
Capability | Supported |
Collect vulnerability data | Yes |
Collect host/asset context | Yes |
Respond or remediate | No |
Native alert mapping | Not applicable |
Bi-directional sync | No |
The connector runs on a Stellar Cyber Data Processor (DP) and executes on a configurable interval.
Data Collected from Cyrisma
The integration retrieves vulnerability and host context data from Cyrisma.
Collected Data Types
Vulnerabilities
Associated with hosts
Derived from Cyrisma vulnerability scans
Host / Asset Context
Automatically extracted as part of vulnerability ingestion
This data is indexed within Stellar Cyber and can be queried using standard threat hunting and investigation workflows.
Authentication Model
The Stellar Cyber connector authenticates to Cyrisma using API credentials issued by Cyrisma Support.
Authentication characteristics:
Uses an API Name and API Key
Credentials are scoped for MSSP use
Authentication is read-only
No customer credentials are shared with Stellar Cyber
The API credentials allow Stellar Cyber to retrieve vulnerability reporting data only.
Multi-Tenant (MSSP) Data Model
Cyrisma is a multi-tenant SaaS platform. Each managed customer environment is treated as a tenant.
For proper data alignment:
Each Cyrisma organization should map to a corresponding Stellar Cyber tenant
The Stellar Cyber tenant ID is stored in Cyrisma at the organization level
Vulnerability data is tagged with the appropriate tenant context during ingestion
This ensures data is correctly attributed and searchable per customer environment.
High-Level Integration Flow
At a conceptual level, the integration follows this sequence:
Cyrisma issues API credentials to the MSSP
The Stellar Cyber connector authenticates using those credentials
Tenant identifiers are used to associate Cyrisma organizations with Stellar Cyber tenants
Vulnerability data is retrieved from Cyrisma reporting endpoints
Data is ingested into Stellar Cyber indexes for investigation and correlation
No inbound connectivity to Cyrisma is required.
Data Querying and Validation
Once ingestion is active, Cyrisma data can be identified within Stellar Cyber by:
Content indexed under vulnerability and asset indexes
Metadata identifying Cyrisma as the data source
Message classification fields associated with Cyrisma vulnerability records
This enables SOC analysts to correlate Cyrisma findings with other telemetry such as endpoint, network, and identity data.
Limitations and Considerations
The integration is collect-only; response actions are not supported
Only vulnerability and related host data are ingested
Scan scheduling and configuration remain managed entirely in Cyrisma
Data freshness depends on the configured connector interval
The integration does not create or modify Cyrisma findings
Security and Best Practices
Restrict API credentials to Stellar Cyber use only
Store API keys securely
Validate tenant ID mappings before enabling ingestion
Periodically verify ingestion and data freshness
Monitor connector execution status within Stellar Cyber
Configuration and Full Connector Documentation
This Knowledge Base article intentionally avoids duplicating Stellar Cyber UI steps and connector configuration details.
For step-by-step configuration, connector fields, intervals, and validation procedures, refer to the official Stellar Cyber Cyrisma Connector documentation: