Learn Secure Raven
Comprehensive guides, tutorials, and API references to help you get the most out of Secure Raven's autonomous compliance monitoring platform.
Get started
Everything you need to deploy, configure, and master Secure Raven.
Quick Start
Get up and running with Secure Raven in under 10 minutes. Connect your first data source, deploy an agent, and run your initial compliance scan.
Platform Overview
Understand how Secure Raven works end-to-end, from autonomous agents and missions to findings, evidence, and audit-ready compliance reports.
Configuration Guide
Fine-tune your deployment with advanced configuration options. Set up notification channels, customize scan schedules, and manage team permissions.
Browse by topic
Deep-dive into specific areas of the platform with detailed documentation.
Getting Started
Step-by-step onboarding guides, prerequisites, and environment setup instructions.
Agents & Missions
Deploy and manage autonomous security agents. Create missions, configure schedules, and review results.
Compliance Frameworks
Map controls to SOC 2, HIPAA, ISO 27001, GDPR, and custom frameworks with automated coverage tracking.
Database Connections
Connect PostgreSQL, MySQL, MongoDB, and other data sources with secure, encrypted connections.
Findings & Evidence
Understand severity levels, manage findings, collect audit evidence, and generate compliance reports.
API & Automation
Integrate Secure Raven into your workflows with our REST API, webhooks, and SDK libraries.
Popular articles
The most-read guides and tutorials from our documentation.
Getting started with your first scan
Learn how to connect a data source, configure your first agent, and run an initial compliance scan in minutes.
Configuring SOC 2 controls
Map your infrastructure controls to SOC 2 Trust Service Criteria with automated monitoring and evidence collection.
Setting up agent missions
Create recurring missions for your Raven agents to autonomously monitor security posture around the clock.
Connecting PostgreSQL databases
Securely connect PostgreSQL instances using encrypted credentials and configure scan permissions.
Understanding findings severity
Learn how Secure Raven classifies findings from critical to informational and prioritizes remediation.
Customizing compliance frameworks
Build custom compliance frameworks tailored to your organization's unique regulatory requirements.
Managing team permissions
Set up role-based access controls, invite team members, and configure granular permission policies.
API authentication guide
Generate API keys, configure scopes, implement token rotation, and follow authentication best practices.
Can't find what you're looking for?
Our support team is here to help. Reach out and we'll get you the answers you need.