Skip to main content

Introduction

Introduction

Welcome to the fundamental guide of ThreatKey, your comprehensive security posture management platform. This guide is designed to equip you with the necessary knowledge to maximize the benefit of using ThreatKey in your organization's security management efforts.

Understanding ThreatKey

What does ThreatKey do?

ThreatKey is a cloud-native platform that helps you identify and remediate cybersecurity risks in your cloud and software-as-a-service (SaaS) environments. We scan your environments for compliance risks and misconfigurations. We present these risks as actionable findings, which include the steps you can take to fix them. You can use these findings to manage and track your efforts to improve the security posture of your cloud and SaaS environments.

Key concepts

Sources

These are your systems and tools that ThreatKey monitors for security risks. Sources can be cloud platforms (think AWS, GCP, or Azure), or SaaS applications (think Atlassian Suite, Salesforce, or Google Workspace).

Findings

Findings are potential security risks that ThreatKey identifies in your connected sources. Each finding contains information about the risk, its potential impact, and steps to remediate the issue.

Remediation

This is the process of addressing the findings identified by ThreatKey. Remediation often involves adjusting settings or configurations in your sources.

Destinations

Destinations are the endpoints to which ThreatKey can send findings for further processing. These can be task management tools like Jira, communication tools like Slack, or incident response tools like PagerDuty.

Getting started

Create an account

Visit ThreatKey to create an account. Enter your email and click the link in the confirmation email to get started.

Connect sources

Next, connect your tools and systems to ThreatKey. Navigate to the Sources page on the ThreatKey dashboard and follow the prompts for each source you want to connect.

Set up destinations

Choose where you'd like ThreatKey to send your findings. Navigate to the Destinations page and set up the desired destinations.

Manage findings

Check your dashboard regularly to view and manage your findings. Each finding provides details about the identified risk and recommendations for remediation.

Track remediation

Keep track of your remediation efforts directly in ThreatKey. ThreatKey will automatically mark findings as Resolved when we detect that you've fixed them. If you have findings that you know you aren't going to fix, you can Ignore them to make sure you only see your most important findings.