15-20 minutes
Onboard Your Workspace
Create your workspace, first administrator, and integration keys so your team can start ingesting findings safely.
Audience: Workspace owners and first tenant administrators
Read guide30-45 minutes
After Login: First-Day Next Steps
Use this day-one checklist to move from an empty workspace to validated findings and clear ownership.
Audience: New tenant admins and security leads
Read guide10-15 minutes
Ingest Your First Findings
Run your first scan, submit findings, and confirm data quality before expanding to more integrations.
Audience: Security engineers, CI owners, and integration engineers
Read guideOngoing, daily review recommended
Review and Prioritize Findings
Prioritize remediation using risk, exploitability, ownership, and tenant policy tuning so teams fix what matters first.
Audience: Security triage teams, engineering leads, and service owners
Read guideFirst 30 days
What To Do After First Findings
Convert initial findings into a repeatable security program with clear metrics, ownership, and reporting.
Audience: Security program owners and engineering managers
Read guide2 minutes
Deploy the Pipeline Scanner
Embed Trivy, Semgrep, TruffleHog, and Syft into every commit with a single workflow file. Works with GitHub Actions, GitLab CI, and Bitbucket Pipelines.
Audience: DevOps engineers, platform engineers, and security engineers
Read guide3 minutes
Gate Deploys with Hosted Rego Guardrails
Add a lightweight CI step that sends deploy context to your tenant and gets an allow, warn, or deny decision back without self-hosting OPA.
Audience: Platform engineers, release managers, and security engineers
Read guide5 minutes
Deploy the Cloud Scanner on AWS
Scan your AWS environment for misconfigurations with Prowler, deployed as a Lambda container on EventBridge Scheduler — no EC2, no always-on compute.
Audience: Cloud engineers, security engineers, platform teams
Read guide5 minutes
Deploy the Cloud Scanner on GCP
Scan GCP project posture with Prowler via a serverless Cloud Run Job triggered by Cloud Scheduler. One Terraform apply deploys to any number of projects and regions.
Audience: Cloud engineers, security engineers, platform teams
Read guide2 minutes
Deploy the Kubernetes Scanner
Scan cluster posture with kube-bench (CIS benchmarks), kubescape, and Kyverno policy telemetry. One Helm chart install, one kubectl secret — done.
Audience: Platform engineers, Kubernetes administrators, security engineers
Read guide5 minutes
Deploy the SaaS Scanner
Discover over-privileged OAuth grants, stale app access, and shadow AI tool sprawl across Google Workspace, Microsoft 365, and GitHub. Runs entirely inside your tenant boundary.
Audience: Security engineers, identity and access management teams, platform engineers
Read guide3 minutes
Deploy the VM and Host Scanner
Ingest OSSEC and Wazuh host intrusion detection alerts into the platform for correlation with cloud and container findings. Works with Docker Compose, systemd, or ECS Fargate.
Audience: Security operations teams, infrastructure engineers
Read guide5 minutes
Deploy the Security Agent
Run BlackShield's governed Go security agent inside your environment with tenant-scoped assignments, MCP context, AI Gateway controls, and approval gates around every mutation.
Audience: Security engineers, platform engineers, and security operations teams
Read guide10 minutes
Deploy Network Sensor on AWS
Capture live network traffic using VPC Traffic Mirroring, deploy sensor instances with CloudFormation or CDK, and stream findings automatically to the platform.
Audience: Platform engineers, network architects, security engineers
Read guide10 minutes
Deploy Network Sensor on GCP
Stream live traffic using Packet Mirroring, deploy sensor VM with Terraform, and ingest findings via the managed SIEM connector.
Audience: Platform engineers, GCP administrators, security engineers
Read guide10 minutes
Deploy Network Sensor on Azure
Capture traffic using Virtual Network TAP, deploy sensor VM with Bicep, and bridge network telemetry into the security platform.
Audience: Platform engineers, Azure administrators, security engineers
Read guide5-15 minutes
Network Sensor Troubleshooting
Diagnostic runbook for container startup, traffic capture, API connectivity, health checks, resource usage, and ingestion gaps.
Audience: Operations engineers, DevOps teams, security operations teams
Read guide10 minutes
Network Sensor Scaling and Performance
Capacity planning, performance tuning, and sizing guidance for high-volume network telemetry ingestion.
Audience: Platform architects, operations engineers, security engineers
Read guide15 minutes
Network Sensor High Availability & Architecture
Design resilient network sensor deployments with failover, load balancing, and multi-region architectures.
Audience: Platform architects, network engineers, SRE teams
Read guide10-15 minutes
What Data BlackShield Uses, Stores, and Shares
BlackShield should tell customers exactly which record categories exist in the workspace, which ones appear in tenant-admin screens, and which legal documents cover processor and privacy commitments.
Audience: Security buyers, legal teams, privacy teams, and procurement stakeholders
Read guide12-18 minutes
What Security Buyers Should Expect from BlackShield
BlackShield should earn trust with concrete product controls: authenticated workspace access, rate-limited sensitive actions, triage workflows in `/findings` and `/alerts`, and exportable evidence from `/reports`, `/audit`, and `/compliance`.
Audience: Security buyers, procurement leads, legal teams, and risk stakeholders
Read guide15-20 minutes
How to Answer Security Reviews About BlackShield
Answer buyer questionnaires by pointing to concrete BlackShield controls: identity setup, API key governance, audit exports, compliance evidence, and tenant self-service deletion.
Audience: Security buyers, procurement teams, legal reviewers, and revenue teams supporting due diligence
Read guide15 minutes
What Happens to Your Data When You Leave BlackShield
BlackShield should tell customers exactly how offboarding works: open `/tenant-rights`, confirm the workspace snapshot, collect any needed audit or report exports, then run the tenant deletion flow with a typed confirmation phrase.
Audience: Compliance, legal, procurement, and platform operations teams
Read guide10 minutes
Incident Response and Customer Notifications
Understand incident severity, escalation flow, and communication expectations so your team can respond quickly.
Audience: Security leads, operations teams, and customer success teams
Read guide8-12 minutes
Availability, Support, and SLAs
Review uptime targets, support response commitments, and escalation channels by plan tier.
Audience: Operations, support, procurement, and service owners
Read guide15-20 minutes
Executive Reporting Pack: MTTR, Risk Trends, and SLA
Build leadership-ready remediation reporting with MTTR, critical/high backlog, SLA performance, and ownership rollups tied to CIS and NIST governance language.
Audience: Security leaders, engineering managers, tenant admins, and customer-facing stakeholders
Read guide10-15 minutes
How BlackShield Shows Control Coverage, Gaps, and Evidence
BlackShield turns mapped findings into a benchmark heatmap, service rollups, control drill-down, and a CSV export so customers can prove where coverage exists and where gaps still need work.
Audience: Security leads, auditors, tenant admins, service owners, and buyers validating control visibility
Read guide12-20 minutes
Disaster Recovery and Business Continuity
Plan recovery objectives, failover validation, and communication steps before a major service disruption.
Audience: Platform operations teams and business continuity owners
Read guide10 minutes
What BlackShield Secures for You and What Your Team Owns
BlackShield owns the product controls in the platform; your team owns the way you configure identities, keys, scan scope, and operational approvals inside your workspace.
Audience: Security architects, compliance owners, procurement reviewers, and platform administrators
Read guide12-15 minutes
How BlackShield Protects APIs and Tenant Boundaries (OWASP API Top 10: 2023)
BlackShield protects its APIs with authenticated access, role checks, rate limits on sensitive flows, and audit trails for evidence access and administrative changes.
Audience: Security architects, AppSec reviewers, buyers, and compliance stakeholders
Read guide15-20 minutes
How BlackShield Controls Access to Your Workspace
BlackShield gives tenant admins a concrete identity surface: configure Google, Okta, or Azure AD, validate OIDC before enabling it, map groups to roles, rotate SCIM tokens, and review identity audit activity.
Audience: IT admins, security operations teams, workspace owners, and procurement reviewers validating access control
Read guide10-15 minutes
How BlackShield Produces Audit-Ready Evidence
BlackShield gives authorized users a concrete audit workflow: filter events by action, actor, and time range, then export CSV or JSON evidence while recording the export itself in the audit trail.
Audience: Security admins, compliance teams, auditors, and buyers validating accountability
Read guide10-15 minutes
How to Export or Delete Your BlackShield Data (GDPR/CCPA)
Today, BlackShield gives tenant admins a self-service account snapshot and workspace deletion flow in `/tenant-rights`; if your process requires evidence before deletion, capture it from `/audit` and `/reports` first.
Audience: Tenant admins, privacy officers, legal stakeholders, and buyers reviewing customer data control
Read guide15-20 minutes
Set Up AI Gateway for Your Team
Connect one approved provider key, create a client for your IDE or automation, test the gateway, and apply a simple policy pack your team can understand.
Audience: Tenant admins, security leads, and workspace owners
Read guide20-30 minutes
Troubleshooting and Platform Limits
Run a practical multi-scanner troubleshooting playbook for ingestion, authentication, provider connectivity, and throughput so teams can isolate failures fast across CI, cloud, SaaS, Kubernetes, and VM sources.
Audience: Tenant admins, DevOps teams, scanner operators, integration owners, and support engineers
Read guide5-10 minutes
Integrating Threat Intel Blocklists
Automate the deployment of Threat Intel indicators directly into your security stack, including AWS WAF, Egress Proxies, DNS sinkholes, and EDR systems.
Audience: Security engineers, SOC analysts, and network administrators
Read guide