Guides
Security checklists are often overwhelming, generic, and difficult to maintain. Sentry's Guides feature transforms traditional security checklists into an intelligent, visual, and actionable security management system tailored to your organization's specific needs.

Smart Security Guides
Sentry automatically curates security guides based on:
Your Organization Profile Guides adapt to your team size, development tools, business tools, and operational context - showing only relevant security practices.
User Roles Different team members see different guides:
Administrators get infrastructure and access control guides
Developers receive secure coding and CI/CD security guidance
All members receive personal security best practices
Executives see compliance and governance recommendations
Current Security Posture The system prioritizes guides based on your organization's current vulnerabilities and gaps identified through monitoring.
Visual Progress Tracking
Unlike static checklists, Sentry's Guides provide:
Progress Indicators
Completion percentage by category
Visual heatmaps showing weak areas
Team-wide and individual progress tracking
Priority Ranking
Critical items flagged for immediate action
Recommended completion order based on security impact
Dependencies between security tasks
Context-Aware Recommendations
Each guide item includes:
Clear step-by-step instructions
Rationale explaining why this security measure matters
Links to relevant Sentry features that can help
External resources and documentation
How to Use Guides
Navigate to the Guides Section: Access from your organization's dashboard
Review Your Profile: Ensure your organization profile is complete for personalized recommendations
Start with Critical Items: Focus on high-priority security measures first
Assign Tasks: Delegate guide items to appropriate team members
Track Progress: Check items off as you complete them
Regular Reviews: Revisit guides quarterly as new security practices emerge
Guide Categories
Personal Security
Account security and authentication
Device protection
Password management
Secure communication practices
Team Operations
Access management
Onboarding/offboarding procedures
Security training requirements
Communication channel security
Infrastructure
Domain and DNS security
Server and endpoint hardening
Network security configurations
Backup and disaster recovery
Development
Repository security
Code review processes
Dependency management
Secret management
Compliance
W3OS Standard alignment
Industry-specific requirements
Audit preparation
Documentation requirements
Pro Tip: Set aside time in team meetings to review and complete guide items together. Security is a team effort, and collaborative completion improves adoption and understanding.
Last updated