Surface Security

Lancez-Vous. C'est gratuit
ou s'inscrire avec votre adresse e-mail
Surface Security par Mind Map: Surface Security

1. Security Posture

1.1. Checks & Monitors

1.2. Data Exporters

1.3. Software Security Bill of Materials (SSBOM)

2. Administration

2.1. Users

2.2. Groups

2.3. Dkron jobs

2.4. Notifications

3. DNS & IPs

3.1. DNS Records

3.2. IP Ranges

4. Identity Provider

4.1. Basic Authentication

4.2. Google

4.3. Other SSOs

5. Integrations

5.1. Github

5.2. GCP

5.3. AWS

5.4. Cloudflare

5.5. Slack

6. Identity & Access Management

6.1. Users

6.2. Groups

6.3. Roles & Permissions

6.4. Service accounts

7. Findings

7.1. Dependency Analysis

7.2. Static Analysis

7.3. Secrets Analysis

7.4. Container Scanning

7.5. VM Scanning

7.6. Penetration Testing

8. Inventory

8.1. Applications

8.2. Git Repositories

8.3. Instances

8.3.1. EC2 Instances

8.3.2. Containers

8.3.3. Compute Engines

8.4. Instance images

8.4.1. VM images

8.4.2. Container images

8.5. Storage

8.5.1. Databases

8.5.2. Buckets

8.6. Networks

8.7. Physical Assets

9. Scanners

9.1. Nuclei

9.2. HTTPX

9.3. Trivy

9.4. Nmap

9.5. Rootbox