Skip to main content

Before using DeepTraQ, ensure that you have completed the basic account setup and have the required assets or integrations available depending on the type of security scan you want to run.

Account Setup

RequirementDescription
DeepTraQ accountSign up using a business email or authenticate using supported identity providers.
Supported sign-in methodsEmail and password, Google account, or Microsoft account or Github.
Region selectionSelect your data residency region during account setup. Currently, only India is supported.

Note: For potential customers requiring a different data residency, DeepTraq can host the platform in the US region upon request. Please contact sales@deeptraq.ai for region-specific access and onboarding.

Assets Required for Scanning

Different DeepTraQ modules require different types of assets or integrations. Ensure the relevant assets are available before creating scans.

ModuleRequired AssetsDescription
Code SecurityGit repository accessA repository hosted on GitHub, GitLab, or Bitbucket containing the application source code. Read-only access via Personal Access Token (PAT) is required for private repositories. Public/open-source repositories do not require a PAT.
Web Application SecurityTarget website URLPublic or internal web application URL to scan. Authentication credentials may be required for protected applications.
Network Perimeter SecurityPublic IP addressesPublic-facing IP addresses or hostnames that should be scanned for exposed services and vulnerabilities.
Cloud Workload SecurityServer or workload accessWorkloads such as virtual machines or servers where the DeepTraQ agent can collect vulnerability data.
CSPMCloud account integrationCloud account access for AWS, Azure, GCP, or Oracle Cloud to evaluate configuration security posture. Read-only audit access must be provided to ensure secure and non-intrusive assessments.

Optional Requirements

Some scans may require additional configuration depending on the environment.

RequirementDescription
Authentication credentialsRequired for scanning authenticated areas of web applications.
Cloud access permissionsRead-only access is required to pull workload details and evaluate cloud configurations for CSPM scans.
Repository permissionsRequired for code scanning integrations to analyze source code and dependencies

Ensuring these prerequisites are ready will allow scans to be configured and executed without errors.