You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# ThreatMapper - Runtime Threat Management and Attack Path Enumeration for Cloud Native
14
14
15
-
> [!IMPORTANT]
16
-
> [Upcoming Changes to ThreatMapper Threat Intel Feeds](https://www.deepfence.io/blog/upcoming-changes-to-threatmapper-threat-intel-feeds-what-you-need-to-know)
15
+
> [!NOTE]
16
+
> This project is maintained by https://threatmapper.org
17
17
18
18
Deepfence ThreatMapper hunts for threats in your production platforms, and ranks these threats based on their risk-of-exploit. It uncovers vulnerable software components, exposed secrets and deviations from good security practice. ThreatMapper uses a combination of agent-based inspection and agent-less monitoring to provide the widest possible coverage to detect threats.
19
19
20
20
With ThreatMapper's **ThreatGraph** visualization, you can then identify the issues that present the greatest risk to the security of your applications, and prioritize these for planned protection or remediation.
21
21
22
-
*[Learn more about ThreatMapper](https://community.deepfence.io/threatmapper/docs/v2.5/) in the product documentation.
22
+
*[Learn more about ThreatMapper](https://threatmapper.org/threatmapper/docs/v2.5/) in the product documentation.
23
23
24
-
*[See ThreatMapper running](https://community.deepfence.io/threatmapper/docs/v2.5/demo) in the live demo sandbox.
24
+
*[See ThreatMapper running](https://threatmapper.org/threatmapper/docs/v2.5/demo) in the live demo sandbox.
25
25
26
26
## When to use ThreatMapper
27
27
@@ -44,7 +44,7 @@ ThreatMapper consists of two components:
44
44
45
45
### The Management Console
46
46
47
-
You [deploy the Management Console first](https://community.deepfence.io/threatmapper/docs/v2.5/console/), on a suitable docker host or Kubernetes cluster. For example, on Docker:
47
+
You [deploy the Management Console first](https://threatmapper.org/threatmapper/docs/v2.5/console/), on a suitable docker host or Kubernetes cluster. For example, on Docker:
48
48
49
49
```shell script
50
50
# Docker installation process for ThreatMapper Management Console
Once the Management Console is up and running, you can [register an admin account and obtain an API key](https://community.deepfence.io/threatmapper/docs/v2.5/console/initial-configuration).
56
+
Once the Management Console is up and running, you can [register an admin account and obtain an API key](https://threatmapper.org/threatmapper/docs/v2.5/console/initial-configuration).
57
57
58
58
### Cloud Scanner tasks
59
59
60
-
ThreatMapper [Cloud Scanner tasks](https://community.deepfence.io/threatmapper/docs/v2.5/cloudscanner/) are responsible for querying the cloud provider APIs to gather configuration and identify deviations from compliance benchmarks.
60
+
ThreatMapper [Cloud Scanner tasks](https://threatmapper.org/threatmapper/docs/v2.5/cloudscanner/) are responsible for querying the cloud provider APIs to gather configuration and identify deviations from compliance benchmarks.
61
61
62
-
The task is deployed using a Terraform module. The ThreatMapper Management Console will present a basic configuration that may be deployed with Terraform, or you can refer to the expert configurations to fine-tune the deployment ([AWS](https://community.deepfence.io/threatmapper/docs/cloudscanner/aws), [Azure](https://community.deepfence.io/threatmapper/docs/cloudscanner/azure), [GCP](https://community.deepfence.io/threatmapper/docs/cloudscanner/gcp)).
62
+
The task is deployed using a Terraform module. The ThreatMapper Management Console will present a basic configuration that may be deployed with Terraform, or you can refer to the expert configurations to fine-tune the deployment ([AWS](https://threatmapper.org/threatmapper/docs/cloudscanner/aws), [Azure](https://threatmapper.org/threatmapper/docs/cloudscanner/azure), [GCP](https://threatmapper.org/threatmapper/docs/cloudscanner/gcp)).
63
63
64
64
### Sensor Agents
65
65
66
-
Install the [sensor agents](https://community.deepfence.io/threatmapper/docs/v2.5/sensors/) on your production or development platforms. The sensors report to the Management Console; they tell it what services they discover, provide telemetry and generate manifests of software dependencies.
66
+
Install the [sensor agents](https://threatmapper.org/threatmapper/docs/v2.5/sensors/) on your production or development platforms. The sensors report to the Management Console; they tell it what services they discover, provide telemetry and generate manifests of software dependencies.
67
67
68
68
The following production platforms are supported by ThreatMapper sensor agents:
69
69
70
-
*[Kubernetes](https://community.deepfence.io/threatmapper/docs/v2.5/sensors/kubernetes/): ThreatMapper sensors are deployed as a daemonset in the Kubernetes cluster, using a helm chart.
71
-
*[Docker](https://community.deepfence.io/threatmapper/docs/v2.5/sensors/docker/): ThreatMapper sensors are deployed as a lightweight container.
72
-
*[Amazon ECS](https://community.deepfence.io/threatmapper/docs/v2.5/sensors/aws-ecs): ThreatMapper sensors are deployed as a daemon service using a task definition.
73
-
*[AWS Fargate](https://community.deepfence.io/threatmapper/docs/v2.5/sensors/aws-fargate): ThreatMapper sensors are deployed as a sidecar container, using a task definition.
74
-
*[Bare-Metal or Virtual Machines](https://community.deepfence.io/threatmapper/docs/v2.5/sensors/linux-host/): ThreatMapper sensors are deployed within a lightweight Docker runtime.
70
+
*[Kubernetes](https://threatmapper.org/threatmapper/docs/v2.5/sensors/kubernetes/): ThreatMapper sensors are deployed as a daemonset in the Kubernetes cluster, using a helm chart.
71
+
*[Docker](https://threatmapper.org/threatmapper/docs/v2.5/sensors/docker/): ThreatMapper sensors are deployed as a lightweight container.
72
+
*[Amazon ECS](https://threatmapper.org/threatmapper/docs/v2.5/sensors/aws-ecs): ThreatMapper sensors are deployed as a daemon service using a task definition.
73
+
*[AWS Fargate](https://threatmapper.org/threatmapper/docs/v2.5/sensors/aws-fargate): ThreatMapper sensors are deployed as a sidecar container, using a task definition.
74
+
*[Bare-Metal or Virtual Machines](https://threatmapper.org/threatmapper/docs/v2.5/sensors/linux-host/): ThreatMapper sensors are deployed within a lightweight Docker runtime.
75
75
76
76
For example, run the following command to start the ThreatMapper sensor on a Docker host:
77
77
@@ -101,21 +101,21 @@ docker run -dit \
101
101
102
102
Note: Image tag `quay.io/deepfenceio/deepfence_agent_ce:2.5.7-multiarch` is supported in amd64 and arm64/v8 architectures.
103
103
104
-
On a Kubernetes platform, the sensors are installed using [helm chart](https://community.deepfence.io/threatmapper/docs/v2.5/sensors/kubernetes/)
104
+
On a Kubernetes platform, the sensors are installed using [helm chart](https://threatmapper.org/threatmapper/docs/v2.5/sensors/kubernetes/)
105
105
106
106
### Next Steps
107
107
108
-
Visit the [Deepfence ThreatMapper Documentation](https://community.deepfence.io/threatmapper/docs/v2.5/), to learn how to get started and how to use ThreatMapper.
108
+
Visit the [Deepfence ThreatMapper Documentation](https://threatmapper.org/threatmapper/docs/v2.5/), to learn how to get started and how to use ThreatMapper.
109
109
110
110
111
111
# Get in touch
112
112
113
113
Thank you for using ThreatMapper. Please feel welcome to participate in the [ThreatMapper Community](COMMUNITY.md).
114
114
115
-
*[Deepfence Community Website](https://community.deepfence.io)
115
+
*[ThreatMapper Community Website](https://threatmapper.org)
116
116
*[<imgsrc="https://img.shields.io/badge/slack-@deepfence-brightgreen.svg?logo=slack">](https://join.slack.com/t/deepfence-community/shared_invite/zt-podmzle9-5X~qYx8wMaLt9bGWwkSdgQ) Got a question, need some help? Find the Deepfence team on Slack
117
117
*[](https://github.com/deepfence/ThreatMapper/issues) Got a feature request or found a bug? Raise an issue
118
-
*[](https://community.deepfence.io/threatmapper/docs/v2.5/) Read the documentation in the [Deepfence ThreatMapper Documentation](https://community.deepfence.io/threatmapper/docs/v2.5/)
118
+
*[](https://threatmapper.org/threatmapper/docs/v2.5/) Read the documentation in the [Deepfence ThreatMapper Documentation](https://threatmapper.org/threatmapper/docs/v2.5/)
119
119
*[productsecurity at deepfence dot io](SECURITY.md): Found a security issue? Share it in confidence
120
120
* Find out more at [deepfence.io](https://deepfence.io/)
0 commit comments