Guides

Security checklists are often overwhelming, generic, and difficult to maintain. Sentry's Guides feature transforms traditional security checklists into an intelligent, visual, and actionable security management system tailored to your organization's specific needs.

Smart Security Guides

Sentry automatically curates security guides based on:

Your Organization Profile Guides adapt to your team size, development tools, business tools, and operational context - showing only relevant security practices.

User Roles Different team members see different guides:

  • Administrators get infrastructure and access control guides

  • Developers receive secure coding and CI/CD security guidance

  • All members receive personal security best practices

  • Executives see compliance and governance recommendations

Current Security Posture The system prioritizes guides based on your organization's current vulnerabilities and gaps identified through monitoring.

Visual Progress Tracking

Unlike static checklists, Sentry's Guides provide:

Progress Indicators

  • Completion percentage by category

  • Visual heatmaps showing weak areas

  • Team-wide and individual progress tracking

Priority Ranking

  • Critical items flagged for immediate action

  • Recommended completion order based on security impact

  • Dependencies between security tasks

Context-Aware Recommendations

Each guide item includes:

  • Clear step-by-step instructions

  • Rationale explaining why this security measure matters

  • Links to relevant Sentry features that can help

  • External resources and documentation

How to Use Guides

  1. Navigate to the Guides Section: Access from your organization's dashboard

  2. Review Your Profile: Ensure your organization profile is complete for personalized recommendations

  3. Start with Critical Items: Focus on high-priority security measures first

  4. Assign Tasks: Delegate guide items to appropriate team members

  5. Track Progress: Check items off as you complete them

  6. Regular Reviews: Revisit guides quarterly as new security practices emerge

Guide Categories

Personal Security

  • Account security and authentication

  • Device protection

  • Password management

  • Secure communication practices

Team Operations

  • Access management

  • Onboarding/offboarding procedures

  • Security training requirements

  • Communication channel security

Infrastructure

  • Domain and DNS security

  • Server and endpoint hardening

  • Network security configurations

  • Backup and disaster recovery

Development

  • Repository security

  • Code review processes

  • Dependency management

  • Secret management

Compliance

  • W3OS Standard alignment

  • Industry-specific requirements

  • Audit preparation

  • Documentation requirements

Last updated