Surface Security

Get Started. It's Free
or sign up with your email address
Surface Security by Mind Map: Surface Security

1. Security Posture

1.1. Checks & Monitors

1.2. Data Exporters

1.3. Software Security Bill of Materials (SSBOM)

2. Administration

2.1. Users

2.2. Groups

2.3. Dkron jobs

2.4. Notifications

3. DNS & IPs

3.1. DNS Records

3.2. IP Ranges

4. Identity Provider

4.1. Basic Authentication

4.2. Google

4.3. Other SSOs

5. Integrations

5.1. Github

5.2. GCP

5.3. AWS

5.4. Cloudflare

5.5. Slack

6. Identity & Access Management

6.1. Users

6.2. Groups

6.3. Roles & Permissions

6.4. Service accounts

7. Findings

7.1. Dependency Analysis

7.2. Static Analysis

7.3. Secrets Analysis

7.4. Container Scanning

7.5. VM Scanning

7.6. Penetration Testing

8. Inventory

8.1. Applications

8.2. Git Repositories

8.3. Instances

8.3.1. EC2 Instances

8.3.2. Containers

8.3.3. Compute Engines

8.4. Instance images

8.4.1. VM images

8.4.2. Container images

8.5. Storage

8.5.1. Databases

8.5.2. Buckets

8.6. Networks

8.7. Physical Assets

9. Scanners

9.1. Nuclei

9.2. HTTPX

9.3. Trivy

9.4. Nmap

9.5. Rootbox