• Product

      Product

      Application Security Platform

      Use Cases

      Shift Left & DevSecOps Supply Chain Security Software Bill of Materials (SBOM) Container Runtime Security & Compliance Cloud Native Application Security
      What is Deepfactor and How Does It Work?
      4-Minute Video
      What is Deepfactor and How Does It Work? >
  • Pricing
    • Pricing Plans
  • Resources

      Resources

      All Resources Next-Gen AppSec Series Case Studies Demos Videos Glossary Webinars Whitepapers Workshops Latest Blogs Documentation
      Implement Effective Next-Gen Container Runtime Security in Kubernetes and Cloud Native Apps
      Whitepaper
      Implement Effective Next-Gen Container Runtime Security in Kubernetes and Cloud Native Apps >
  • Company
    • About
    • Leadership
    • Partners
    • News and Events
    • Careers
    • Contact Us
  • LOGIN
Cisco Logo Deepfactor is now part of Cisco | Learn more
Learn more
Deepfactor Logo
  • Product

      Product

      Use Cases

      Application Security Platform

      Use Cases

      Shift Left & DevSecOps Supply Chain Security Software Bill of Materials (SBOM) Container Runtime Security & Compliance Cloud Native Application Security
      What is Deepfactor and How Does It Work?
      4-Minute Video
      What is Deepfactor and How Does It Work? >
  • Pricing
    • Pricing Plans
  • Resources

      Resources

      All Resources Next-Gen AppSec Series Case Studies Demos Videos Glossary
      Webinars Whitepapers Workshops Latest Blogs Documentation
      Next-Gen AppSec Series—Deepfactor SCA: 80% Less Noise, 50% Lower Cost
      Next-Gen AppSec Series
      Next-Gen AppSec Series—Deepfactor SCA: 80% Less Noise, 50% Lower Cost >
  • Company
    • About
    • Leadership
    • Partners
    • News and Events
    • Careers
    • Contact Us
LOGIN
Deepfactor's Application Security Platform will no longer be offered for sale or renewal effective September 20, 2024.

Getting Started

  • QuickStart Guide
  • Install Deepfactor CLI
  • Deepfactor Support Matrix

Tutorials

  • SBOM & SCA
    • Artifact Releases
    • Deepfactor Scanner
    • Integrate Deepfactor scanner in your CI/CD pipelines
    • Scanning container images from private registries using Deepfactor CLI
    • Scan container images in K8s cluster
      • Scanning images from private registries in K8s cluster using Deepfactor
      • Scanning container images from private registries with basic authentication support in K8s
      • Scanning container images from private AWS Elastic Container Registry (ECR) in EKS on AWS Fargate
      • Scanning container images from private AWS Elastic Container Registry (ECR) in EKS on AWS EC2
  • Runtime Security
    • Introduction to Deepfactor Runtime Security
    • Deepfactor CLI Reference
    • Kubernetes workload
      • Run your Kubernetes workload with Deepfactor
      • Install Deepfactor Mutating Webhook
      • Configure Deepfactor Kubernetes admission webhook
      • Install Deepfactor K8s webhook on EKS Fargate
      • Selecting the pods you want to run with Deepfactor
      • Configuring application name, component name and component version in K8s webhook
      • Install Deepfactor mutating admission webhook using Argo CD
      • Install Deepfactor portal & webhook using Argo CD and vault
      • Use image pull secret for Runtime images
    • Containers/Other orchestration platforms
      • Run your Container Images with Deepfactor
      • Run containers in ECS with Deepfactor
    • Non-containerized workloads
      • Running non-containerized applications with Deepfactor

Deepfactor Platform

  • Introduction to Deepfactor
  • Alert Policies
  • Alert States and Triaging Flows
  • Deepfactor’s Correlation Capabilities
  • Organization and Teams
  • Role Based Access Control
  • Insights Knowledge Base
    • Privilege Separation and Privilege Dropping
    • Buffer Overflow Alerts
  • Knowledge Base
    • Deepfactor scan errors
    • K8s Webhook & Runtime Troubleshooting Guide
    • Tools for viewing CycloneDX and SPDX SBOMs
    • Graceful handling of pod restarts
    • Deepfactor telemetry events
    • Deepfactor Instrumentation Warning Messages
    • Best Practices for running your applications with Deepfactor in production environments
    • Golang Specific Notes
    • How to access Deepfactor Portal in different AWS subnet types
    • How the Deepfactor Management Portal Communicates With The Outside World
    • Language Specific Agents (LSA)
    • Mixed libc environments
    • Sensitive Information and Secrets in Process Environment Remediation
    • Running HAProxy with Deepfactor
    • Augmenting Alert Evidence with Runtime Stack Traces
  • FAQs
    • General FAQs
    • Open Source Disclosure

Integrations

  • Single Sign On (SSO) for authentication to Deepfactor
  • Integrate Jira with Deepfactor
  • Integrate Slack with Deepfactor
  • Okta
  • Deepfactor HTTPS webhook

Self managed Deepfactor portal

  • Deepfactor Portal architecture & deployment options
  • Install Self managed Deepfactor portal
    • Kubernetes Cluster
      • Prerequisites for deploying Deepfactor portal in Kubernetes Cluster
      • Deploying Deepfactor Portal in your Kubernetes Cluster
      • Install Deepfactor portal using Helm
      • Customizing Deepfactor portal deployment
        • Customizing your Deepfactor Portal Deployment in K8s
        • Deploy Deepfactor Portal With Resource Limits
        • Deploying Deepfactor Portal using external IP
        • Deepfactor Portal Installation with Existing Ingress Controller
    • AWS EC2
      • Prerequisites for installing Deepfactor Portal in AWS Cloud
      • Deploying Deepfactor on AWS using CFT
      • Install AWS Certificate Manager(ACM) certificate on Deepfactor portal EC2 instance
    • VMWare vSphere
      • Deepfactor Portal Proxy Configuration for OVA deployments
      • Prerequisites for deploying Deepfactor portal in VWware vSphere
      • Deploying Deepfactor on VMware vSphere
  • Manage Deepfactor Portal
    • Using Deepfactor APIs
    • Managing Users
    • Updating your Deepfactor Portal
    • Updating Deepfactor portal certificate
  • Deepfactor Portal Certificate
    • Generate certificate using cert-manager for Deepfactor portal
    • Create self-signed certificate for Deepfactor Portal on your K8s cluster
    • Create AWS Private CA Certificate for Deepfactor Portal on your K8s cluster
    • Create Let’s Encrypt certificate for Deepfactor Portal on your K8s cluster

Release Notes

  • Deepfactor Release Notes
  • Home
  • Docs
  • Self managed Deepfactor portal
  • Install Self managed Deepfactor portal
  • AWS EC2

Deploying Deepfactor on AWS using CFT

Deepfactor provides an AWS CloudFormation template to simplify the process of installing and provisioning the Deepfactor Portal on your AWS account.

Note: Before you start the deployment, check the prerequisites for AWS using CFT.

 

Supported Regions #

Deepfactor Portal can be installed in any of the following AWS regions:
us-west-1
us-west-2
us-east-1
us-east-2
ap-southeast-1
ap-northeast-1
eu-central-1

If your region is not listed above, please email us at: support@deepfactor.io.

Prerequisites #

Ensure you have the following prerequisites satisfied before you begin:

Prerequisites-for-installing-Deepfactor-Portal

 

Deployment Instructions #

This guide assumes the user has basic knowledge of AWS CloudFormation.

Please follow the steps below to install Deepfactor Portal:

Step 1:  Create your Deepfactor account on my.deepfactor.io

Step 2: Download the Deepfactor AWS CloudFormation template by clicking on the “Download CFT” button.

 

Step 3: Login to your AWS account and go to CloudFormation.

Step 4:  Click on Create stack. In the “Specify Template” section, select “Upload a template file.”

 

Step 5: Upload the CloudFormation Template downloaded from my.deepfactor.io.

Step 6: In the “Specify Stack Details” step, enter a name for the stack and configuration details.

The config options are explained below

Amazon EC2 Configuration

  1. EC2 Instance Type: EC2 instance type of the node on which the Deepfactor portal should be installed.
  2. EC2 Key Name: SSH key pair. You will need this key pair (pem file) to ssh into the Deepfactor instance.

Network Configuration

  1. VPC: AWS virtual private cloud you want Deepfactor portal to be installed in.
  2. Subnet: Subnet you want the Deepfactor portal to be installed in. Please ensure you select a subnet in the selected VPC else stack creation will fail. A security group will be created in the specified VPC and the Deepfactor Portal EC2 instance will be created in the subnet you select.
  3. Allow SSH from: CIDR range from which you would like to SSH into the Deepfactor portal EC2 machine.
  4. Allow Deepfactor Telemetry from: CIDR range from which you would like to run your applications. Security groups would be created to allow these IP ranges to communicate with the Deepfactor portal over 443 and 13443 ports
  5. Portal Hostname (Optional): A valid FQDN (fully qualified domain name) for your Deepfactor Portal instance. If you do not enter the hostname, the default AWS public hostname will be used.
  6. Associate Elastic IP?: If you select yes, an elastic ip will be associated with the Deepfactor Portal Instance. Please note, if you select this option, your Deepfactor portal EC2 instance will have a public IP but only ports 443, 13443 and 22 would be exposed to the CIDR ranges you entered in the parameters section.
  7. Proxy URL (Optional): If this EC2 instance will be launched behind a proxy, please enter the full proxy URL (ex. http://10.1.1.16:3128). If not, please leave this parameter empty.

Deepfactor Portal Admin User

  1. First Name: Admin user’s first name.
  2. Last Name: Admin user’s last name.
  3. Email: Email address with which you will login to the Deepfactor portal.
  4. Password: Password of the admin user.

Note: Please remember the email and password. You will need them to login to the Deepfactor portal once the installation completes.

Container Images Registry Config (Optional)

If you want to pull Deepfactor container images from your internal registry, please fill this section else leave it blank.

  1. Internal Container Image Registry: Full url of your internal container registry. If you leave this field blank, container images will be pulled from Deepfactor’s public registry (public.ecr.aws/deepfactor/).
  2. DockerConfig: If the registry requires secrets to pull images, provide the docker config in base64 encoded format. If not, please leave this field blank.

 

 

Step 7: Click next and then create.

Step 8: CloudFormation will now start creating the stack. You can check the status of the stack creation in the “Events” section. It generally takes about 5 minutes for the AWS resources to be created and another 5-10 minutes for Deepfactor Portal to be setup on the AWS EC2 instance.

Step 9: Once the stack is created, go to the “Outputs” section. Here you will find the CustomPortalHostName, PublicPortalUrl and PrivatePortalUrl. Please check the following article to know which one to use to access the Deepfactor Portal in your network environment.

How to access Deepfactor Portal in different AWS subnet types.

 

 

Resources created in your AWS account #

The following resources will created after the CloudFormation stack is successfully created

1. DfControlPlane: An EC2 instance of the type you selected. We recommend the following EC2 instance types.

  • m5a.2xlarge
  • m5.2xlarge
  • m4.2xlarge
  • r5a.2xlarge
  • r5.2xlarge
  • r4.2xlarge
  • c5.4xlarge
  • c4.4xlarge

2. DfSecurityGroup: A security group with the following rules
Inbound rules

Type Protocol Port Source
SSH TCP 22 Configurable
HTTPS TCP 443 Configurable
Custom TCP TCP 13443 Configurable

 

Outbound rules

Type Protocol Port Destination
All traffic All All 0.0.0.0/0

 

3. DfEIP (Optional): An Elastic IP that is assigned to DfControlPlane EC2 instance. This will be created only if you select ‘yes’ for ‘Associate Elastic IP?’ (AssignEIP) parameter.

Note: The CloudFormation stack creation might fail if you hit any AWS service quota limits. Please refer to the following AWS documentation article to understand AWS service limits.

AWS service quotas

 

Architecture Diagram #

The following architecture diagram shows the resources created by the CFT. Please note, Elastic IP address is optional and will be created only if you select ‘yes’ for ‘Associate Elastic IP?’ in the parameters section.

Also, depending upon where your applications are running you can decide to deploy the Deepfactor portal in a public or private subnet. You can read more about how you can access the Deepfactor portal in different subnet types in the following article

How to access Deepfactor Portal in different AWS subnet types

 

 

Costs of resources #

1. DfControlPlane: EC2 instance pricing will depend on the instance size selected in the parameters section of the CFT. Please use the following link to know the pricing for the instance selected

https://aws.amazon.com/ec2/pricing/on-demand/

2. DfEIP (Optional): If you selected ‘yes’ for ‘Associate Elastic IP?’ in the parameters section, an Elastic IP (EIP) will be assigned to the Deepfactor Portal Instance. In such a case, the EIP cost will be incurred. To understand how EIP is charged by AWS, please refer to the following article

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/elastic-ip-addresses-eip.html#eip-pricing

3. Deepfactor license cost: In order to use the Deepfactor Portal, you will need an active Deepfactor On Premise license.

Please find the details of the Deepfactor licensing cost below:
https://www.deepfactor.io/pricing

Please reach out to us by clicking the contact us button to obtain a license.

 

Backup and Recovery #

We attach EBS volumes to the Deepfactor Portal EC2 machine. We recommend taking backups of the EBS volumes at regular intervals so you can use them in case of a failure.

Was this article helpful?
Still stuck? How can we help?

How can we help?

Updated on February 13, 2023
Prerequisites for installing Deepfactor Portal in AWS CloudInstall AWS Certificate Manager(ACM) certificate on Deepfactor portal EC2 instance

Powered by BetterDocs

Table of Contents
  • Supported Regions
  • Prerequisites
  • Deployment Instructions
  • Resources created in your AWS account
  • Architecture Diagram
  • Costs of resources
  • Backup and Recovery
Deepfactor Icon

Deepfactor is a next-gen application security platform, using static container scan data + runtime analysis to prioritize vulnerabilities to those representing true risk to a business—based on reachability, runtime usage, deployment context, and exploit maturity.

Product Pricing Resources Company Documentation Login

SUBSCRIBE TO OUR NEWSLETTER!

Sign Up
LinkedIn Icon YouTube Icon GitHub Icon Twitter Icon

© 2025 Deepfactor, Inc. All Rights Reserved.

Privacy Statement | Terms of Service | Open Source Disclosure