URIP Documentation Hub
Last updated: 2026-04-29 Status: Stable Product: URIP — Unified Risk Intelligence Platform
CISO Executive Summary
URIP turns fragmented security data into clear, actionable intelligence — without replacing the tools you already own.
Business value in three sentences: - URIP connects to your existing security stack (61 tools) and unifies every finding into one risk register and one compliance dashboard — eliminating the manual spreadsheet work that slows down incident response and audit preparation. - Live threat intelligence (EPSS, CISA KEV, MITRE ATT&CK, AlienVault OTX) automatically reprioritises risks based on what attackers are doing right now, not just theoretical severity. - One data layer feeds both the CISO dashboard and the compliance officer's frameworks — so when a CVE causes a SOC 2 control to fail, both teams see the same evidence instantly.
ROI talking points:
| Benefit | Typical outcome |
|---|---|
| Audit cost reduction | Cut external audit preparation from weeks to days by having controls pre-mapped to live risk data with evidence already linked |
| Breach prevention | Identify actively exploited vulnerabilities (CISA KEV) on production assets within minutes of connector poll, not months after a scan report |
| Security spend optimisation | Retire redundant tools when URIP shows overlapping coverage; justify new investments with FAIR-based financial risk quantification |
| Mean-time-to-remediate | Auto-create Jira/ServiceNow tickets on risk assignment with SLA tracking — no risk falls through email cracks |
| Board-ready reporting | One-click PDF exports from Risk Overview with 30/60/90-day trend lines and domain heat maps |
Recommended first read: Architecture (10 minutes) → Quickstart (15 minutes) → User Guide (reference).
What is URIP?
URIP is the cockpit for your security stack — not another tool in it. It connects to your existing security tools (Tenable, CrowdStrike, SentinelOne, Zscaler, Okta, and 57 more), enriches every finding with live exploit and threat-actor intelligence, normalises severity to a single 0–10 scale, and renders the result as two linked dashboards: a Risk Intelligence dashboard for the CISO and a Compliance dashboard for the Compliance Officer. Both dashboards share the same data — no double entry, no spreadsheet pivoting.
Start Here — Pick Your Role
Not sure where to begin? Follow the path for your role.
CISO / VP Security
Your first three pages: 1. Architecture — Understand the three-layer model, deployment options, and security posture (10 minutes) 2. User Guide — Risk Center — See how the dashboards answer "Where am I most exposed today?" 3. Strategic Modules — Review CSPM, DSPM, FAIR risk quantification, and Attack Path for board-level planning
Security Analyst
Your first three pages: 1. Quickstart — Register, connect your first tool, see your first risk (15 minutes) 2. Risk Center Guide — Master the Risk Register, Threat Intel, Remediation Tracker, and bulk actions 3. User Guide — Risk Scoring — Understand exactly how URIP computes the 0–10 composite score
Connector Admin / IT Engineer
Your first three pages: 1. Connector Setup — Wizard walkthrough, OAuth flows, credential management 2. Connector Catalogue — All 61 tools with prerequisites and per-vendor permission troubleshooting 3. Troubleshooting — Connector Issues — Diagnose HTTP 401/403, rate limits, and zero-findings scenarios
Compliance Officer
Your first three pages: 1. Compliance Workflow — 8-step guide: activate framework → review controls → upload evidence → invite auditor → generate report 2. Compliance Frameworks — All 20 frameworks with control counts, grades, and what URIP evaluates 3. Auditor Portal — How to invite external auditors and what they see
External Auditor
Your first three pages: 1. Auditor Portal — Your complete guide: how to log in, request evidence, track status, and communicate test results 2. Compliance Frameworks — Understand which frameworks are audit-grade vs preview 3. Compliance Workflow — See the internal team's process so you know what evidence to expect
Documentation Index
| Document | Description |
|---|---|
| Quickstart | Your first login, first connector, first risk — zero to useful in 15 minutes |
| Page-by-Page Walk-through | Every URIP screen with a screenshot + "what you do here" — 65 pages, demo-ready |
| User Guide | Full feature guide covering every module, page, and workflow |
| Connector Catalogue | All 61 supported tools organised by category with setup details |
| Compliance Frameworks | All 20 pre-built compliance frameworks with control counts and scope |
| Architecture | How URIP works — the three-layer model, deployment options, and security posture |
| Troubleshooting | Common issues with symptom → plain-English cause → what to click to fix it |
| Glossary | 50+ URIP and security terms defined in plain English (KEV, EPSS, FAIR, CNAPP, JTI, RBAC, and more) |
| All Docs Index | Full listing of all documentation files |
Per-Section Guides
| Guide | Description |
|---|---|
| Risk Center Guide | Dashboard, Risk Overview, Risk Register, Threat Intel, Remediation, Acceptance |
| Domains Guide | Endpoint, Identity, Network, Cloud, Email, Mobile, OT, External Threat domains |
| Strategic Modules | CSPM, DSPM, AI Security, ZTNA, Attack Path, Risk Quantification |
| Compliance Workflow | Compliance Dashboard, Frameworks, Controls, Evidence, Policies, Vendor Risk, Reports |
| Auditor Portal Guide | Complete external-auditor workflow — login, evidence requests, control tracking, sign-off |
| Connector Setup | Setting up connectors step by step via the Tool Catalog wizard |
| Workflows | Automation workflows: risk → ticket → remediation → acceptance |
| Admin & Settings | Tenants, modules, users, roles, MFA, and scoring configuration |
Quick Reference
Access
| Role | How to access |
|---|---|
| All users | Sign in at the URIP URL your administrator provided |
| New users | Use the registration link your administrator sent you |
| VAPT vendors | Sign in at the Vendor Portal URL your administrator provided |
| Auditors | Use the time-bound invitation link sent by your administrator |
Account Setup
URIP is enterprise-only — there is no public self-serve sign-up. Accounts are provisioned by an administrator. The flow is:
- Administrator creates your organisation's tenant
- Administrator sends you an invitation with your Tenant ID
- You register your account using the Tenant ID + your email + a password you choose
- You enrol multi-factor authentication on first login
- You access the platform
See the Quickstart for the full step-by-step walkthrough.
Key Numbers
| Metric | Value |
|---|---|
| Supported integrations | 61 |
| Compliance frameworks | 20 |
| Total controls (across all frameworks) | ~1,476 |
| Live intelligence feeds | 4 (EPSS, CISA KEV, MITRE ATT&CK, AlienVault OTX) |
See the All Docs Index for a complete listing of every documentation file.