Skip to main content

Snyk Integration Setup

This guide walks you through gathering the information needed to configure a Snyk organization for use with RAD Security’s Application Security connector. Snyk is a SaaS application and cloud security platform. Once connected, RAD Security can import Snyk findings for correlation with runtime and cloud security data.

Prerequisites

Before you begin, ensure you have:
  • A Snyk tenant on the Snyk Enterprise plan
  • Access to your Snyk organization with a user account that has the Org Admin, Group Admin, or Group Member role
  • Access to a RAD Security workspace with integration permissions
Enterprise plan required. Due to restrictions on Snyk REST API access, a Snyk Enterprise plan is required to use Snyk as an Application Security provider in RAD Security.
Service Account authentication only. The RAD Security integration authenticates using Snyk’s OAuth 2.0 Service Account flow (Client ID + Client Secret). Personal API Tokens are not supported.

Required Permissions

Ensure the role assigned to the service account includes the following Snyk permissions:
OperationRequired Snyk Permissions
Query applicationsorg.project.read
Query application findingsorg.read, org.project.read, org.project.snapshot.read
Query findings across all applicationsorg.read, org.project.read, org.project.snapshot.read
Get application finding detailsorg.read, org.project.read, org.project.snapshot.read

Step 1: Locate your Organization ID

1

Log in to Snyk

Sign in to Snyk with a user account that has the Org Admin, Group Admin, or Group Member role.
2

Select your organization

Select the organization you want to use with the RAD Security integration.
3

Open organization settings

Click Settings for the selected organization.
4

Copy the Organization ID

Scroll to the Organization ID section and copy the value to a safe location.

Step 2: Create a Service Account

1

Open Service Accounts

From the organization settings, select Service Accounts.
2

Fill in the service account details

Enter a Name for the service account (e.g., “RAD Security AppSec”) and select a role that encompasses all of the required permissions.
3

Select OAuth 2.0 Client Credentials

Under Service account type, select OAuth 2.0 Client credentials.
RAD Security only supports the OAuth 2.0 Client credentials service account type. API key service accounts and Personal API Tokens will not work with this integration.
4

Create the service account

Click Create service account.
5

Copy the credentials

Immediately copy and save the following values:
  • Client ID
  • Client Secret
Store these values now. The Client Secret is only displayed once at creation time. If lost, you will need to create a new service account.

Step 3: Identify your Data Region

Your Snyk organization is hosted in one of several regional Snyk environments. You can determine your region from your Snyk URL and on the Snyk login page. For more detail, see the Snyk regional hosting documentation. RAD Security accepts the following data region values:
RegionValue
United States 01SNYK-US-01
United States 02SNYK-US-02
European Union 01SNYK-EU-01
Australia 01SNYK-AU-01

Step 4: Configure in RAD Security

Navigate to your RAD Security workspace and configure the Snyk integration with the following parameters:
ParameterRequiredDescriptionExample
Client IDYesClient ID from the service account created in Step 2abc123-def456-ghi789
Client SecretYesClient Secret from the service account created in Step 2your-client-secret-here
Organization IDYesOrganization ID gathered in Step 1xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
Data RegionYesRegion where your Snyk organization is hostedSNYK-US-01

Verify Integration

After completing the setup, verify your integration is working:
  1. Navigate to Data Sources > Integrations > AppSec in RAD Security
  2. Locate your Snyk integration
  3. Check the connection status shows as Connected
  4. Verify application security findings are being synced
Your Snyk integration is now configured! RAD Security can now import Snyk findings for vulnerability management and correlation with runtime data.

What Data is Synced

Once configured, RAD Security will sync the following data from Snyk:
  • Snyk projects and their metadata
  • Associated repositories and targets
  • Project organization structure
  • SAST findings (Snyk Code)
  • Open source vulnerabilities (Snyk Open Source)
  • Container image vulnerabilities (Snyk Container)
  • Infrastructure as Code issues (Snyk IaC)
  • Severity and CVSS scores
  • Affected files, packages, and line numbers
  • Vulnerability descriptions and references
  • Remediation recommendations
  • Finding status and history

Use Cases

Unified Vulnerability View

Aggregate Snyk findings alongside runtime and cloud findings for a single view of application risk.

Shift-Left Correlation

Correlate vulnerabilities discovered by Snyk in code and dependencies with runtime behavior observed by RAD Security.

Risk Prioritization

Prioritize Snyk findings based on runtime exposure, reachability, and blast radius.

Compliance Reporting

Include Snyk findings in compliance and audit reporting generated from RAD Security.

Troubleshooting

Possible causes:
  • Client ID or Client Secret copied incorrectly
  • Wrong service account type (API key instead of OAuth 2.0 Client credentials)
  • Service account was deleted or rotated
  • Credentials were used in the wrong Data Region
Solution:
  • Verify Client ID and Client Secret were copied exactly (no extra spaces)
  • Confirm the service account type is OAuth 2.0 Client credentials
  • Ensure the Data Region matches the region where the organization is hosted
  • Create a new service account if the original is missing or its secret has been lost
Possible causes:
  • Service account role missing required permissions
  • Role was changed after service account creation
Solution:
  • Review the Required Permissions table
  • Confirm the assigned role includes org.read, org.project.read, and org.project.snapshot.read
  • Update the role or assign a different role that covers the required permissions
Possible causes:
  • Wrong Organization ID supplied
  • Organization ID copied from the wrong organization
  • Data Region mismatch
Solution:
  • Re-copy the Organization ID from Settings → Organization ID in Snyk
  • Confirm you are reading the setting from the correct organization
  • Ensure the Data Region matches the region where the organization is hosted
Possible causes:
  • Snyk tenant is not on the Enterprise plan
  • REST API access is not enabled for the tenant
Solution:
  • Confirm your Snyk tenant is on the Enterprise plan
  • Contact Snyk support to verify REST API access
  • Upgrade the tenant if required before retrying the integration
Possible causes:
  • No projects or scans exist in the Snyk organization
  • Initial sync still in progress
  • API rate limits reached
Solution:
  • Verify projects and findings exist in the Snyk organization
  • Allow up to 15 minutes for the initial sync to complete
  • Review the integration logs in RAD Security for errors
  • Monitor Snyk API usage for rate-limit errors

Security Best Practices

Use Service Accounts

Prefer a dedicated service account over user credentials so the integration survives user role or employment changes.

Least Privilege

Assign a role that grants only the permissions listed in the Required Permissions table. Avoid broad administrative roles.

Rotate Credentials Regularly

Periodically rotate the service account Client Secret as part of normal security hygiene.

Secure Credential Storage

Store Client ID and Client Secret in a secrets vault. Never commit them to source control.

Monitor Service Account Activity

Review Snyk audit logs to detect unusual activity by the integration service account.

Revoke Unused Accounts

Periodically review service accounts and delete any that are no longer in use.

Additional Resources

Snyk Service Accounts

Upstream documentation for Snyk service accounts

Authentication for API

Snyk documentation on API authentication

Regional Hosting & Data Residency

Snyk documentation on regional URLs and data residency

AppSec Integrations Overview

Explore other Application Security integrations

Next Steps

Evidence Room

View and analyze security findings

Runtime Security

Learn about RAD’s container runtime security

RADBot

Use RADBot to prioritize and remediate findings

Data Sources Overview

Explore all available data sources