JupiterOne + Threat Stack Integration

Navigate SecOps complexity by leveraging JupiterOne’s Threat Stack integration to consolidate vulnerability scan findings and mapping them to the corresponding code repos, projects, and developers.

Overview of the Threat Stack Integration

JupiterOne provides an open source integration with Threat Stack. This integration consolidates findings from Threat Stack with other vulnerability and code scanners into a centralized vulnerability management dashboard.

JupiterOne maps the findings to corresponding code repos, application projects, and the developers. Using simple queries, security teams can easily identify the code owner/maintainer to remediate the findings.

 

The integration connects directly to Threat Stack APIs to obtain agents and vulnerability findings data. Customers authorize access by creating an API Key in their target Threat Stack account and providing that credential to JupiterOne.

Threat Stack Ingested Resources

Below are the specific resources pulled from the managed integration, and the subsequent relationships these resources have with the rest of your environment.

threatstack_account HAS threatstack_agent
threatstack_agent PROTECTS aws_instance
threatstack_agent PROTECTS server
threatstack_agent IDENTIFIED cve

Providing Complete Visibility for Leading Cloud-Native Organizations

Providing Complete Visibility for Leading Cloud-Native Organizations

databricks logo