Intro
Cyber Risk Intelligence Platform documentation hub
Build scalable cyber risk operations with clear technical guidance for tenancy, scoring, integrations, reporting, and API automation.
This documentation is structured for operators, security engineers, and developers who need fast, actionable guidance with low ambiguity.
Security assurance at a glance
- Security-by-design defaults on tenant scoping, authorization checks, and audit trail capture.
- Zero-trust access patterns for privileged and cross-tenant risk paths.
- Immutable report and board-pack snapshots to preserve governance evidence integrity.
- Responsible disclosure process with defined triage and coordinated remediation timelines.
Explore the documentation
Security and trust
Review zero-trust access, encryption posture, data handling boundaries, and integrity controls.
Core concepts
How the platform works end-to-end: findings in, scored, worked through the lifecycle, and frozen as governance evidence.
Dashboard
Understand your posture score, risk heat indicator, posture bands, and the difference between executive and technical views.
Platform workflows
Learn scoring, reporting, and third-party risk operational flows.
API reference
Integrate with API endpoints, auth model, and error envelope.
Integrations
Connect SecurityScorecard, Jira, Slack, Teams, and Webhook targets.
Trust and legal baseline
Review POPIA, PAIA, privacy notice scope, cookies, and website/platform terms coverage.
Need help?
If you cannot find what you need, contact support through your platform support path and include tenant ID, timestamp, and endpoint/page context.
To report a suspected vulnerability, follow the disclosure process in the Responsible disclosure guide.