Skip to content

Commit ffc0a3e

Browse files
committed
Update documentation
1 parent cfb5b7c commit ffc0a3e

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

docs/docs/threatstryker/operations/compliance.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,14 +25,14 @@ You can test individual benchmarks, or you can combine a test (scan) to include
2525

2626
The benchmarks available vary by cloud provider:
2727

28-
| Benchmark | AWS ECS | Azure | GCP | Kubernetes Host | Linux Host |
29-
|-----------|---------|-------|-----|-----------------|------------|
30-
| CIS | Y | Y | Y | | |
31-
| GDPR | Y | | | Y | Y |
32-
| HIPAA | Y | Y | | Y | Y |
33-
| PCI-DSS | Y | | | Y | Y |
34-
| SOC-2 | Y | | | | |
35-
| NIST | Y | Y | | Y | Y |
28+
| Benchmark | AWS | Azure | GCP | Kubernetes Host | Linux Host |
29+
|-----------|-----|-------|-----|-----------------|------------|
30+
| CIS | Y | Y | Y | | |
31+
| GDPR | Y | | | Y | Y |
32+
| HIPAA | Y | Y | | Y | Y |
33+
| PCI-DSS | Y | | | Y | Y |
34+
| SOC-2 | Y | | | | |
35+
| NIST | Y | Y | | Y | Y |
3636

3737
## Start a Scan
3838

docs/docs/threatstryker/operations/vulnerability-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,4 @@ Most Exploitable Vulnerabilities tab gives a ranked list of vulnerabilities acro
2323
![Most Exploitable Vulnerabilities](../img/DF_MostExploitableVulnerabilities.png)
2424

2525

26-
Optionally, users can tag a subset of nodes using user defined tags and scan a subset of nodes, as described in the ThreatStryker documentation (**TODO** - link)
26+
Optionally, users can tag a subset of nodes using user defined tags and scan a subset of nodes. API client examples can be found [here](https://github.com/deepfence/deepfence_runtime_api/tree/master/scripts/node_tags)

0 commit comments

Comments
 (0)