Getting Started
Quick Start Guide
Welcome to EchelonGraph. Get up and running in under 10 minutes — connect your cloud, run your first scan, and see your entire attack surface.
1. Create Your Account
Sign up at echelongraph.io/signup with your work email. Your workspace is created with complete tenant isolation from day one — your data is fully separated from every other customer.
2. Connect Your Cloud Accounts
Navigate to Settings → Cloud Accounts and click Add Cloud Account. EchelonGraph connects using read-only credentials — we never request write, delete, or modify access to your cloud environment.
We support all three major cloud providers:
- AWS: Cross-account IAM Role with
SecurityAuditpolicy - GCP: Service account with read-only Viewer role (or Workload Identity Federation for zero-secret access)
- Azure: App Registration with
Readerrole on target subscriptions
See Integrations for step-by-step setup guides for each provider.
3. Run Your First Scan
Once connected, EchelonGraph automatically initiates an agentless scan. The scanner queries your cloud provider APIs to discover:
- Compute: VMs, serverless functions, container services
- Network: VPCs, subnets, security groups, firewalls, load balancers
- Storage: Object stores, block storage — with encryption and access policy checks
- Identity: IAM users, roles, policies, service accounts
- Data: Managed databases — encryption status, public access, backup configuration
- Certificates: TLS certificates and their expiry dates
The scan also runs 440+ misconfiguration rules mapped to CIS v2.0 benchmarks and automatically correlates known CVEs against your infrastructure.
No agents to install. No disk snapshots. No write permissions. Pure API-based discovery.
4. View Your Attack Surface
Navigate to the Dashboard to see your interactive 3D blast radius graph. Click any node to explore:
- Asset properties and cloud metadata
- Known vulnerabilities with CVSS scores
- Attack path analysis showing reachable paths from the internet
- Blast radius impact — which resources are at risk if this node is compromised
5. Check Compliance
Go to Compliance to see live scores across 9 frameworks: SOC 2, GDPR, ISO 27001, NIST CSF 2.0, PCI DSS 4.0, HIPAA, CIS v2.0, DPDP Act, and ISMS-P. Each control shows Pass, Fail, Partial, or N/A — with actionable remediation guidance for every finding.
6. Invite Your Team
Navigate to Settings → Users to invite team members with role-based access:
- Viewer: Read-only access to dashboards and reports
- Analyst: Manage alerts, create reports, export data
- Operator: Manage scans, assets, and integrations
- Admin: Full tenant administration
Next Steps
- Integrations — Step-by-step AWS, GCP, Azure, and SSO setup guides
- Scanning Tiers — Compare agentless, network, and runtime scanning
- Security — Configure SSO, MFA, and RBAC for your organization
- Compliance — Deep dive into 9 supported frameworks
- Data Sovereignty — Deployment options for strict data residency requirements