Documentation

Learn Secure Raven

Comprehensive guides, tutorials, and API references to help you get the most out of Secure Raven's autonomous compliance monitoring platform.

Start Here

Get started

Everything you need to deploy, configure, and master Secure Raven.

Quick Start

Get up and running with Secure Raven in under 10 minutes. Connect your first data source, deploy an agent, and run your initial compliance scan.

Read guide

Platform Overview

Understand how Secure Raven works end-to-end, from autonomous agents and missions to findings, evidence, and audit-ready compliance reports.

Read guide

Configuration Guide

Fine-tune your deployment with advanced configuration options. Set up notification channels, customize scan schedules, and manage team permissions.

Read guide
Topics

Browse by topic

Deep-dive into specific areas of the platform with detailed documentation.

Getting Started

Step-by-step onboarding guides, prerequisites, and environment setup instructions.

Explore docs

Agents & Missions

Deploy and manage autonomous security agents. Create missions, configure schedules, and review results.

Explore docs

Compliance Frameworks

Map controls to SOC 2, HIPAA, ISO 27001, GDPR, and custom frameworks with automated coverage tracking.

Explore docs

Database Connections

Connect PostgreSQL, MySQL, MongoDB, and other data sources with secure, encrypted connections.

Explore docs

Findings & Evidence

Understand severity levels, manage findings, collect audit evidence, and generate compliance reports.

Explore docs

API & Automation

Integrate Secure Raven into your workflows with our REST API, webhooks, and SDK libraries.

Explore docs
Popular

Popular articles

The most-read guides and tutorials from our documentation.

Getting started with your first scan

Learn how to connect a data source, configure your first agent, and run an initial compliance scan in minutes.

Configuring SOC 2 controls

Map your infrastructure controls to SOC 2 Trust Service Criteria with automated monitoring and evidence collection.

Setting up agent missions

Create recurring missions for your Raven agents to autonomously monitor security posture around the clock.

Connecting PostgreSQL databases

Securely connect PostgreSQL instances using encrypted credentials and configure scan permissions.

Understanding findings severity

Learn how Secure Raven classifies findings from critical to informational and prioritizes remediation.

Customizing compliance frameworks

Build custom compliance frameworks tailored to your organization's unique regulatory requirements.

Managing team permissions

Set up role-based access controls, invite team members, and configure granular permission policies.

API authentication guide

Generate API keys, configure scopes, implement token rotation, and follow authentication best practices.

Can't find what you're looking for?

Our support team is here to help. Reach out and we'll get you the answers you need.