Surface Security
by Bogdan Oniga
1. Security Posture
1.1. Checks & Monitors
1.2. Data Exporters
1.3. Software Security Bill of Materials (SSBOM)
2. Administration
2.1. Users
2.2. Groups
2.3. Dkron jobs
2.4. Notifications
3. DNS & IPs
3.1. DNS Records
3.2. IP Ranges
4. Identity Provider
4.1. Basic Authentication
4.2. Google
4.3. Other SSOs
5. Integrations
5.1. Github
5.2. GCP
5.3. AWS
5.4. Cloudflare
5.5. Slack
6. Identity & Access Management
6.1. Users
6.2. Groups
6.3. Roles & Permissions
6.4. Service accounts
7. Findings
7.1. Dependency Analysis
7.2. Static Analysis
7.3. Secrets Analysis
7.4. Container Scanning
7.5. VM Scanning
7.6. Penetration Testing
8. Inventory
8.1. Applications
8.2. Git Repositories
8.3. Instances
8.3.1. EC2 Instances
8.3.2. Containers
8.3.3. Compute Engines
8.4. Instance images
8.4.1. VM images
8.4.2. Container images
8.5. Storage
8.5.1. Databases
8.5.2. Buckets