Documentation - ThreatKey Basics & Fundamentals
Documentation - ThreatKey Basics & FundamentalsThreatKey Documentation - Basics & Fundamentals

ThreatKey Documentation - Basics & Fundamentals

This guide will equip you with everything you need to start using the ThreatKey security posture management platform.


Welcome to the basics and fundamentals guide of ThreatKey, your comprehensive security posture management platform. This guide is designed to equip you with the necessary knowledge to maximize the benefit of using ThreatKey in your organization's security management efforts.

Understanding ThreatKey

What is ThreatKey?

ThreatKey is a cloud-based platform that helps organizations identify and remediate security risks. It scans your connected sources for potential security risks and misconfigurations, and presents these as actionable 'findings'. These findings are used to help you manage and track your remediation efforts.

Key Concepts

  1. Sources:

These are your systems and tools that ThreatKey monitors for security risks. Sources can include cloud platforms like AWS, GCP, Azure, or SaaS applications like Atlassian Suite, Salesforce, etc.

  1. Findings:

Findings are potential security risks that ThreatKey identifies in your connected sources. Each finding contains information about the risk, its potential impact, and steps to remediate the issue.

  1. Remediation:

This is the process of addressing the findings identified by ThreatKey. Remediation often involves adjusting settings or configurations in your sources.

  1. Destinations:

Destinations are the endpoints to which ThreatKey can send findings for further processing. These can be task management tools like Jira, communication tools like Slack, or incident response tools like PagerDuty.

Getting Started

  1. Creating an Account:

Start by creating a ThreatKey account. Simply provide your email and click the link in the confirmation email to get started.

  1. Connecting Sources:

Next, connect your tools and systems to ThreatKey. Navigate to the Sources page on the ThreatKey dashboard and follow the prompts for each source you want to connect.

  1. Setting up Destinations:

Choose where you'd like ThreatKey to send your findings. Navigate to the Destinations page and set up the desired destinations.

  1. Managing Findings:

Check your dashboard regularly to view and manage findings. Each finding provides details about the identified risk and recommendations for remediation.

  1. Remediation Tracking:

Keep track of your remediation efforts directly in ThreatKey. Mark findings as 'resolved' once they have been addressed.


Understanding the basics and fundamentals of ThreatKey is the first step to leveraging its potential in managing your organization's security posture. Remember, if you need assistance at any point, our support team is here to help.

Copyright © ThreatKey 2023. All rights reserved.