• Product

      Product

      Application Security Platform

      Use Cases

      Shift Left & DevSecOps Supply Chain Security Software Bill of Materials (SBOM) Container Runtime Security & Compliance Cloud Native Application Security
      What is Deepfactor and How Does It Work?
      4-Minute Video
      What is Deepfactor and How Does It Work? >
  • Pricing
    • Pricing Plans
  • Resources

      Resources

      All Resources Next-Gen AppSec Series Case Studies Demos Videos Glossary Webinars Whitepapers Workshops Latest Blogs Documentation
      Next-Gen AppSec Series—Deepfactor SCA: 80% Less Noise, 50% Lower Cost
      Next-Gen AppSec Series
      Next-Gen AppSec Series—Deepfactor SCA: 80% Less Noise, 50% Lower Cost >
  • Company
    • About
    • Leadership
    • Partners
    • News and Events
    • Careers
    • Contact Us
  • LOGIN
Cisco Logo Deepfactor is now part of Cisco | Learn more
Learn more
Deepfactor Logo
  • Product

      Product

      Use Cases

      Application Security Platform

      Use Cases

      Shift Left & DevSecOps Supply Chain Security Software Bill of Materials (SBOM) Container Runtime Security & Compliance Cloud Native Application Security
      What is Deepfactor and How Does It Work?
      4-Minute Video
      What is Deepfactor and How Does It Work? >
  • Pricing
    • Pricing Plans
  • Resources

      Resources

      All Resources Next-Gen AppSec Series Case Studies Demos Videos Glossary
      Webinars Whitepapers Workshops Latest Blogs Documentation
      Implement Effective Next-Gen Container Runtime Security in Kubernetes and Cloud Native Apps
      Whitepaper
      Implement Effective Next-Gen Container Runtime Security in Kubernetes and Cloud Native Apps >
  • Company
    • About
    • Leadership
    • Partners
    • News and Events
    • Careers
    • Contact Us
LOGIN
Deepfactor's Application Security Platform will no longer be offered for sale or renewal effective September 20, 2024.

Getting Started

  • QuickStart Guide
  • Install Deepfactor CLI
  • Deepfactor Support Matrix

Tutorials

  • SBOM & SCA
    • Artifact Releases
    • Deepfactor Scanner
    • Integrate Deepfactor scanner in your CI/CD pipelines
    • Scanning container images from private registries using Deepfactor CLI
    • Scan container images in K8s cluster
      • Scanning images from private registries in K8s cluster using Deepfactor
      • Scanning container images from private registries with basic authentication support in K8s
      • Scanning container images from private AWS Elastic Container Registry (ECR) in EKS on AWS Fargate
      • Scanning container images from private AWS Elastic Container Registry (ECR) in EKS on AWS EC2
  • Runtime Security
    • Introduction to Deepfactor Runtime Security
    • Deepfactor CLI Reference
    • Kubernetes workload
      • Run your Kubernetes workload with Deepfactor
      • Install Deepfactor Mutating Webhook
      • Configure Deepfactor Kubernetes admission webhook
      • Install Deepfactor K8s webhook on EKS Fargate
      • Selecting the pods you want to run with Deepfactor
      • Configuring application name, component name and component version in K8s webhook
      • Install Deepfactor mutating admission webhook using Argo CD
      • Install Deepfactor portal & webhook using Argo CD and vault
      • Use image pull secret for Runtime images
    • Containers/Other orchestration platforms
      • Run your Container Images with Deepfactor
      • Run containers in ECS with Deepfactor
    • Non-containerized workloads
      • Running non-containerized applications with Deepfactor

Deepfactor Platform

  • Introduction to Deepfactor
  • Alert Policies
  • Alert States and Triaging Flows
  • Deepfactor’s Correlation Capabilities
  • Organization and Teams
  • Role Based Access Control
  • Insights Knowledge Base
    • Privilege Separation and Privilege Dropping
    • Buffer Overflow Alerts
  • Knowledge Base
    • Deepfactor scan errors
    • K8s Webhook & Runtime Troubleshooting Guide
    • Tools for viewing CycloneDX and SPDX SBOMs
    • Graceful handling of pod restarts
    • Deepfactor telemetry events
    • Deepfactor Instrumentation Warning Messages
    • Best Practices for running your applications with Deepfactor in production environments
    • Golang Specific Notes
    • How to access Deepfactor Portal in different AWS subnet types
    • How the Deepfactor Management Portal Communicates With The Outside World
    • Language Specific Agents (LSA)
    • Mixed libc environments
    • Sensitive Information and Secrets in Process Environment Remediation
    • Running HAProxy with Deepfactor
    • Augmenting Alert Evidence with Runtime Stack Traces
  • FAQs
    • General FAQs
    • Open Source Disclosure

Integrations

  • Single Sign On (SSO) for authentication to Deepfactor
  • Integrate Jira with Deepfactor
  • Integrate Slack with Deepfactor
  • Okta
  • Deepfactor HTTPS webhook

Self managed Deepfactor portal

  • Deepfactor Portal architecture & deployment options
  • Install Self managed Deepfactor portal
    • Kubernetes Cluster
      • Prerequisites for deploying Deepfactor portal in Kubernetes Cluster
      • Deploying Deepfactor Portal in your Kubernetes Cluster
      • Install Deepfactor portal using Helm
      • Customizing Deepfactor portal deployment
        • Customizing your Deepfactor Portal Deployment in K8s
        • Deploy Deepfactor Portal With Resource Limits
        • Deploying Deepfactor Portal using external IP
        • Deepfactor Portal Installation with Existing Ingress Controller
    • AWS EC2
      • Prerequisites for installing Deepfactor Portal in AWS Cloud
      • Deploying Deepfactor on AWS using CFT
      • Install AWS Certificate Manager(ACM) certificate on Deepfactor portal EC2 instance
    • VMWare vSphere
      • Deepfactor Portal Proxy Configuration for OVA deployments
      • Prerequisites for deploying Deepfactor portal in VWware vSphere
      • Deploying Deepfactor on VMware vSphere
  • Manage Deepfactor Portal
    • Using Deepfactor APIs
    • Managing Users
    • Updating your Deepfactor Portal
    • Updating Deepfactor portal certificate
  • Deepfactor Portal Certificate
    • Generate certificate using cert-manager for Deepfactor portal
    • Create self-signed certificate for Deepfactor Portal on your K8s cluster
    • Create AWS Private CA Certificate for Deepfactor Portal on your K8s cluster
    • Create Let’s Encrypt certificate for Deepfactor Portal on your K8s cluster

Release Notes

  • Deepfactor Release Notes
  • Home
  • Docs
  • Deepfactor Platform

Introduction to Deepfactor

Deepfactor is an Application Security Platform that empowers engineering teams to create secure and compliant cloud-native applications. With Deepfactor, developers can quickly discover and resolve security vulnerabilities, supply chain risks, and compliance violations early in development and testing, saving valuable engineering time and reducing risk.

The Deepfactor integrated approach to application security saves time and effort integrating multiple security tools into the software development life cycle (SDLC) pipeline. Deepfactor offers:

  1. Software Bill of Materials (SBOM)
  2. Software Composition Analysis (SCA) including dependency scans and container image scans
  3. Runtime security analysis for observing running containers & applications
  4. Compliance Reporting including SOC 2 Type 2, PCI DSS, and NIST 800-53
  5. Correlation between runtime analysis, SBOM, SCA and other modules

 

Software Bill of Materials (SBOM) #

Deepfactor provides a comprehensive SBOM solution to customers. Deepfactor’s SBOM solution includes the following:

  1. Static SBOM
    The static SBOM includes a collection of dependencies, packages in container images as well as licensing information (GPL etc..).
  2. Dynamic SBOM
    The Dynamic SBOM, which is unique to Deepfactor, includes runtime information such as processes, ports, outbound network connections and other information gathered while observing the applications as they are running.
  3. Grouping of containers based on application
    When containers are launched in Kubernetes or other platforms, Deepfactor automatically correlates and groups containers into applications, providing rich context around how the inventory of containers is organized within the enterprise.
  4. SBOM info automatically tied to versions of containers
    Deepfactor automatically catalogs the SBOM based on the version number of an application/container image.
  5. Download to preferred format
    Deepfactor enables the user to simply select the version of a container/app and download the SBOM into their preferred formats.

 

Software Composition Analysis (SCA) including dependency scans and container image scans #

What does Deepfactor’s SCA module do?
Deepfactor performs a scan of dependencies and container images and compares them with over a dozen publicly available vulnerability databases (such as the NIST Vulnerability Database). In addition, Deepfactor provides CVE and related information regarding the dependencies.

How does Deepfactor improve traditional SCA with correlation between runtime analysis?
Whenever available, Deepfactor’s correlation engine determines whether the vulnerable dependencies and packages are used during the application runtime, and overlays this usage information on top of the vulnerability findings to prioritize alerts. Combining static SCA findings with runtime usage information is unique to Deepfactor, and it greatly helps reduce alert fatigue.

Example:
As an example, while traditional SCA tools might say that your container image A has 200 vulnerabilities, Deepfactor is able to give you a much deeper analysis, and will tell you – your application was started in kubernetes namespace N, loaded 7 containers, they have 500 vulnerabilities, 25 of them are higher priority because they were observed to be used by your application when it ran in your dev, test and prod environments.

 

Runtime Security Analysis #

What are the benefits of observing running applications & containers?
While the SCA can help identify known vulnerabilities, applications often exhibit insecure behaviors that haven’t yet been publicly recognized nor are available as known CVEs. These risks typically manifest as high risk behaviors in process, memory, file, and network exhibited by your application code and 3rd party code.

Runtime analysis is highly useful in both dev/test and production environments. During dev and test, it can help uncover risky behaviors in the application code or dependencies, and when fixed, can improve the security posture of the applications when they are deployed in production. Runtime analysis, if implemented in production environments, can help uncover indicators of compromise, by pinpointing suspicious file, network and memory behaviors.

How does Deepfactor’s runtime analysis work?
Deepfactor’s runtime analysis module can be enabled in two ways –
(a) For Kubernetes applications, by using an admission webhook
(b) For docker containers or traditional non-containerized applications, by using a CLI tool dfctl.

When enabled, Deepfactor loads a lightweight library libdf.so,  into every thread/process/container/pod that it is enabled in, and observes over 200 parameters covering file, network, process, memory and other behaviors. Deepfactor then analyzes this telemetry data and pinpoints anomalies that can suggest indicators of risk.

Deepfactor has a robust policy engine that comes with an integrated rule set that provides engineering best practices. Out of the box policies make it extremely simple for dev, QA or security teams to get started very quickly. For organizations with deep security expertise, the Deepfactor policy engine provides the ability to customize and fine-tune the policies.

How can a developer benefit from runtime analysis?
All the alerts include detailed remediation guidance. Since Deepfactor observes the running application, it is capable of providing rich information and context with every alert such as host information, IP addresses, file name, process name and even stack traces. This rich information makes it much easier for developers to identify and remediate the issue.

How does Deepfactor runtime analysis compare with traditional container security tools?
Traditional container security tools that perform runtime analysis, require intrusive kernel mode agents to be installed on each Kubernetes host. Deepfactor requires no kernel mode or host based agents, and uses a lightweight API interception method that works in user space. Please read our whitepaper on API interception here for more details.

 

Compliance Reporting  (SOC 2 Type 2, PCI DSS, NIST 800-53)
#

The importance of Shifting Compliance Left
While it is very important to incorporate security into engineering practices, it is also important to incorporate good hygiene with respect to identifying your application’s compliance violations during dev and test. This not only helps save time when a compliance auditor asks for help with reports for specific versions of your applications, but also avoids last minute scrambles and context-switches for your engineering teams. It’s a great complement to compliance tools like Vanta, Drata, OneTrust etc.

How does Deepfactor’s compliance module work?
Deepfactor maps security alerts from each of the categories noted above (SBOM, SCA, Runtime) to compliance frameworks including SOC 2 Type 2, PCI DSS, and NIST 800-53. When a security alert includes one or more compliance violations, the specific sections of each compliance violation are provided for reference. This enables the engineering/security teams to understand and prioritize the alert based on both its security risk and its risk of violating a compliance framework.

Example: Report of SOC2 violations/risks for an application/container
With Deepfactor, in order to share the list of SOC2 violations/risks for a specific version of an application/container with your compliance auditor, the engineering lead can simply login to Deepfactor, select the version of their application/container, and download the list of alerts that will impact SOC2 for that container image/application and share.

What aspects of compliance does Deepfactor help with?
Compliance controls typically  encompass infrastructure, authorization & access, and applications. It’s important to note that Deepfactor reports compliance violations related to specific controls that belong to application vulnerabilities only. You will still need to complement this with other compliance controls necessary for your specific compliance framework

 

Correlation between runtime analysis, SCA, SBOM and other modules #

What does the Deepfactor correlation engine do?
One of the most powerful elements of the Deepfactor platform is its correlation engine. The ability to analyze running applications and scan static containers are both useful individually. However, correlating between runtime analysis and static analysis can greatly help provide rich context to developers, reduce tool fatigue, and prioritize insights to reduce alert fatigue.

What are some clear examples of how the Deepfactor correlation engine can help improve my DevSecOps?

  1. Correlation between SCA & runtime analysis:
    Overlaying runtime use of libraries or dependencies on top of the full  list of CVEs present in dependencies/OS packages, can help prioritize which vulnerabilities to fix, based on actual runtime use.
  2. Correlation between SBOM & runtime analysis:
    Correlating static SBOM (full list of dependencies & OS packages) with runtime artifcats like listening ports, processes, outbound connections etc, can turn an SBOM into a dynamic SBOM. This can help better understand supply chain risks.
    Correlating SBOM with runtime information around which containers were launched by an application/in a Kubernetes namespace/with a set of labels/tags, can help group containers into applications. This can help automatically organize the inventory of containers into logical groups/teams, that is otherwise extremely hard/manual.
  3. Correlation between compliance and SCA
    Highlight the vulnerabilities in a dependency conveys the security risk in that dependency. Overlaying compliance risk on top of that by highlighting which section of SOC2 Type2 standard, that particular vulnerability or its duration of resolution, might impact, can give a much more holistic view to engineering leadership.

 

How does Deepfactor work? #

The Deepfactor solution includes two components:

Deepfactor Runtime #

Available as CLI or Kubernetes webhook, the runtime scans container images and observes running applications, containers and kubernetes clusters, and sends telemetry data to the portal.

Without requiring host based agents or sidecars, the Deepfactor language-agnostic library loads into only the processes being observed within a container/pod, and collects the relevant telemetry in the user-space of the operating system. It’s lightweight, but yet semantically gathers richer data, and sends the data to the portal.

Deepfactor Portal #

The portal analyzes the raw telemetry provided by the Deepfactor runtime and generates security insights for developers. Deepfactor identifies anomalies and security risks based on a robust customizable ruleset. It also enriches the data with evidence information such as CVE numbers, wherever possible, using third-party databases of known vulnerabilities. The Deepfactor portal can then be integrated with ticketing systems (Jira) to create tickets for developers to fix, messaging systems (Slack) to alert developers of a new vulnerability, and security dashboards to keep the application and product security teams updated that the current status of builds as they move through development and testing.

Was this article helpful?
Still stuck? How can we help?

How can we help?

Updated on February 15, 2024
Alert Policies

Powered by BetterDocs

Table of Contents
  • Software Bill of Materials (SBOM)
  • Software Composition Analysis (SCA) including dependency scans and container image scans
  • Runtime Security Analysis
  • Compliance Reporting  (SOC 2 Type 2, PCI DSS, NIST 800-53)
  • Correlation between runtime analysis, SCA, SBOM and other modules
  • How does Deepfactor work?
    • Deepfactor Runtime
    • Deepfactor Portal
Deepfactor Icon

Deepfactor is a next-gen application security platform, using static container scan data + runtime analysis to prioritize vulnerabilities to those representing true risk to a business—based on reachability, runtime usage, deployment context, and exploit maturity.

Product Pricing Resources Company Documentation Login

SUBSCRIBE TO OUR NEWSLETTER!

Sign Up
LinkedIn Icon YouTube Icon GitHub Icon Twitter Icon

© 2025 Deepfactor, Inc. All Rights Reserved.

Privacy Statement | Terms of Service | Open Source Disclosure