Skip to main content
Skip table of contents


Cymulate Breach and Attack Simulation (BAS) test cybersecurity controls by safely conducting threat activities, tactics, techniques, and procedures in production environments. Cymulate BAS validates security controls against emergent threat activity, confirms remediation, and prepares for audits and penetration tests.

Configuring the Connector for Cymulate

To configure Lucidum to ingest data from Cymulate:

  1. Log in to Lucidum.

  2. In the left pane, click Connector.

  3. In the Connector page, click Add Connector.

  4. Scroll until you find the Connector you want to configure. Click Connect. The Settings page appears.

  5. In the Settings page, enter the following:

    • URL (required): The URL of the Cymulate API, for example,

    • API Key (required): Cymulate API key

    • Verify SSL. For future use.

  6. To test the configuration, click Test.

    • If the connector is configured correctly, Lucidum displays a list of services that are accessible with the connector.

    • If the connector is not configured correctly, Lucidum displays an error message.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.