Follow us

Product Documentation

SERVICE OVERVIEW

Akeero is a cyber security design platform that assists users with identification of potential security weaknesses in their cloud-native products and services and identifies controls to mitigate these weaknesses. The user begins by first mapping out their current or proposed cloud architecture on the Akeero canvas, using either a manual drag and drop approach from a library of predefined components, or by integrating with the user’s AWS account.

As the user is mapping out their architecture, the Akeero product will automatically begin analysing the user’s architecture for threats, using a proprietary algorithm. Threats identified by the algorithm will then begin to be populated on the product interface. Threat identification happens in near real-time. 

The user can, at any point, review the list of threats identified and which relate to the mapped out architecture. A control is provided for each identified threat which can be implemented to mitigate the threat. It is up to the user which controls are implemented.

A dashboard is available to give the user an overview of all projects. Please see the ‘Dashboard’ section below to see what information is displayed.

LIBRARY OF COMPONENTS

The library of components currently consists of all services provided by Amazon Web Services (“AWS”), along with a number of Akeero defined components. In the future the library of available components will expand to include other cloud service providers services, along with other Akeero defined components and user defined components.

THREATS

Each identified threat will contain a unique ID, the ID of the component that it relates to, threat name, description of threat, and severity of threat. In some cases, a threat will have associated controls and in these cases the threat window will also show the name and description of control(s) to mitigate the threat and threat status. The threats identified are not exhaustive and should not replace a general understanding of application architecture.

CONTROLS

As mentioned above, each threat provided by the Akeero algorithm has at least one control associated with it. Each control will mitigate the associated threat to some extent but due to the nature and complexity of the problem any single control will not completely mitigate all of the associated threats and risks. Any controls provided by Akeero are intended as a guide to best practices and are not exhaustive. These controls should not replace a general understanding of application architecture.

THIRD PARTY INTEGRATIONS

Akeero allows users to connect other third party services to their Akeero account and vice versa to provide better functionality. These integrations are optional and are not required for the basic functionality of the Akeero product.

Amazon Web Services

A user can choose to connect their Amazon Web Services (“AWS”) account to Akeero to enable Akeero to read and monitor what AWS resources are deployed in the user’s AWS accounts. This allows the user to easily import their AWS services and map out their architecture on the Akeero canvas. Only certain roles in Akeero have the permissions to connect their AWS account to Akeero.

SCREENS

Dashboard

The dashboard is the first screen a user sees when they log into Akeero. Among the items displayed on the dashboard are:

  • List of the user’s projects
  • Total number of threats with ‘Open’ status
  • Total number of threats with ‘In Progress’ status
  • List of threats sorted by severity. Severity is determined by Akeero and is based on a number of factors.
  • List of user’s projects sorted by risk level. Risk level is determined by the Akeero algorithm and is based on a number of factors.

The user can navigate back to the dashboard at any point.

Canvas

The Canvas screen is used to map out the user’s architecture. As mentioned above, this can be performed manually or by integrating with the user’s AWS account. The canvas screen contains five main sections:

  • Navigation and Options Bar – This allows the user to navigate around the Akeero application and contains options and settings buttons.
  • Drawing Canvas – This is where the user can map out their architecture.
  • Library Panel – The library panel contains all available resources and components that a user can use to map out their architecture.
  • Properties Panel – The properties panel shows all the properties related to the selected component.
  • Threats Panel – The threats panel shows all threats related to the project and is updated in near real-time.

Threats Overview

The Threats Overview screen displays all of the threats within a project and contains three panels:

  • Navigation and Options Bar – This allows the user to navigate around the Akeero application and contains options and settings buttons.
  • Threats Panel – The threats panel shows all threats related to the project and is updated in near real-time.
  • Properties Panel – The properties panel shows all the properties related to the selected component.

Threat

The user can use the Threat screen to get detailed information about each threat, any associated risks, any associated controls and status.

Settings

The Settings screen allows the user to view and make changes to the settings of both the Akeero account and projects contained within.

Ready to jump onboard?

Akeero helps you design quickly and securely.