Home · Docs · Documentation Hub

URIP Documentation Hub

Last updated: 2026-04-29 Status: Stable Product: URIP — Unified Risk Intelligence Platform


CISO Executive Summary

URIP turns fragmented security data into clear, actionable intelligence — without replacing the tools you already own.

Business value in three sentences: - URIP connects to your existing security stack (61 tools) and unifies every finding into one risk register and one compliance dashboard — eliminating the manual spreadsheet work that slows down incident response and audit preparation. - Live threat intelligence (EPSS, CISA KEV, MITRE ATT&CK, AlienVault OTX) automatically reprioritises risks based on what attackers are doing right now, not just theoretical severity. - One data layer feeds both the CISO dashboard and the compliance officer's frameworks — so when a CVE causes a SOC 2 control to fail, both teams see the same evidence instantly.

ROI talking points:

Benefit Typical outcome
Audit cost reduction Cut external audit preparation from weeks to days by having controls pre-mapped to live risk data with evidence already linked
Breach prevention Identify actively exploited vulnerabilities (CISA KEV) on production assets within minutes of connector poll, not months after a scan report
Security spend optimisation Retire redundant tools when URIP shows overlapping coverage; justify new investments with FAIR-based financial risk quantification
Mean-time-to-remediate Auto-create Jira/ServiceNow tickets on risk assignment with SLA tracking — no risk falls through email cracks
Board-ready reporting One-click PDF exports from Risk Overview with 30/60/90-day trend lines and domain heat maps

Recommended first read: Architecture (10 minutes) → Quickstart (15 minutes) → User Guide (reference).


What is URIP?

URIP is the cockpit for your security stack — not another tool in it. It connects to your existing security tools (Tenable, CrowdStrike, SentinelOne, Zscaler, Okta, and 57 more), enriches every finding with live exploit and threat-actor intelligence, normalises severity to a single 0–10 scale, and renders the result as two linked dashboards: a Risk Intelligence dashboard for the CISO and a Compliance dashboard for the Compliance Officer. Both dashboards share the same data — no double entry, no spreadsheet pivoting.


Start Here — Pick Your Role

Not sure where to begin? Follow the path for your role.

CISO / VP Security

Your first three pages: 1. Architecture — Understand the three-layer model, deployment options, and security posture (10 minutes) 2. User Guide — Risk Center — See how the dashboards answer "Where am I most exposed today?" 3. Strategic Modules — Review CSPM, DSPM, FAIR risk quantification, and Attack Path for board-level planning

Security Analyst

Your first three pages: 1. Quickstart — Register, connect your first tool, see your first risk (15 minutes) 2. Risk Center Guide — Master the Risk Register, Threat Intel, Remediation Tracker, and bulk actions 3. User Guide — Risk Scoring — Understand exactly how URIP computes the 0–10 composite score

Connector Admin / IT Engineer

Your first three pages: 1. Connector Setup — Wizard walkthrough, OAuth flows, credential management 2. Connector Catalogue — All 61 tools with prerequisites and per-vendor permission troubleshooting 3. Troubleshooting — Connector Issues — Diagnose HTTP 401/403, rate limits, and zero-findings scenarios

Compliance Officer

Your first three pages: 1. Compliance Workflow — 8-step guide: activate framework → review controls → upload evidence → invite auditor → generate report 2. Compliance Frameworks — All 20 frameworks with control counts, grades, and what URIP evaluates 3. Auditor Portal — How to invite external auditors and what they see

External Auditor

Your first three pages: 1. Auditor Portal — Your complete guide: how to log in, request evidence, track status, and communicate test results 2. Compliance Frameworks — Understand which frameworks are audit-grade vs preview 3. Compliance Workflow — See the internal team's process so you know what evidence to expect


Documentation Index

Document Description
Quickstart Your first login, first connector, first risk — zero to useful in 15 minutes
Page-by-Page Walk-through Every URIP screen with a screenshot + "what you do here" — 65 pages, demo-ready
User Guide Full feature guide covering every module, page, and workflow
Connector Catalogue All 61 supported tools organised by category with setup details
Compliance Frameworks All 20 pre-built compliance frameworks with control counts and scope
Architecture How URIP works — the three-layer model, deployment options, and security posture
Troubleshooting Common issues with symptom → plain-English cause → what to click to fix it
Glossary 50+ URIP and security terms defined in plain English (KEV, EPSS, FAIR, CNAPP, JTI, RBAC, and more)
All Docs Index Full listing of all documentation files

Per-Section Guides

Guide Description
Risk Center Guide Dashboard, Risk Overview, Risk Register, Threat Intel, Remediation, Acceptance
Domains Guide Endpoint, Identity, Network, Cloud, Email, Mobile, OT, External Threat domains
Strategic Modules CSPM, DSPM, AI Security, ZTNA, Attack Path, Risk Quantification
Compliance Workflow Compliance Dashboard, Frameworks, Controls, Evidence, Policies, Vendor Risk, Reports
Auditor Portal Guide Complete external-auditor workflow — login, evidence requests, control tracking, sign-off
Connector Setup Setting up connectors step by step via the Tool Catalog wizard
Workflows Automation workflows: risk → ticket → remediation → acceptance
Admin & Settings Tenants, modules, users, roles, MFA, and scoring configuration

Quick Reference

Access

Role How to access
All users Sign in at the URIP URL your administrator provided
New users Use the registration link your administrator sent you
VAPT vendors Sign in at the Vendor Portal URL your administrator provided
Auditors Use the time-bound invitation link sent by your administrator

Account Setup

URIP is enterprise-only — there is no public self-serve sign-up. Accounts are provisioned by an administrator. The flow is:

  1. Administrator creates your organisation's tenant
  2. Administrator sends you an invitation with your Tenant ID
  3. You register your account using the Tenant ID + your email + a password you choose
  4. You enrol multi-factor authentication on first login
  5. You access the platform

See the Quickstart for the full step-by-step walkthrough.

Key Numbers

Metric Value
Supported integrations 61
Compliance frameworks 20
Total controls (across all frameworks) ~1,476
Live intelligence feeds 4 (EPSS, CISA KEV, MITRE ATT&CK, AlienVault OTX)

See the All Docs Index for a complete listing of every documentation file.