User Guide
Complete guide covering all features and workflows.
InsiderShield User Guide
Welcome to InsiderShield! This guide will help you get started with achieving and maintaining compliance for your organization.
Table of Contents
- Getting Started
- Dashboard Overview
- Managing Controls
- Integrations
- Security Findings
- Policies
- Reports
- Team Management
- Settings
Getting Started
Creating Your Account
- Visit app.insidershield.io/auth/signup
- Enter your work email address
- Create a secure password
- Verify your email address
- Complete your organization setup
Choosing Your Framework
InsiderShield supports multiple compliance frameworks:
- SOC 2 - Service Organization Control 2
- ISO 27001 - Information Security Management
- GDPR - General Data Protection Regulation
- HIPAA - Health Insurance Portability and Accountability Act
You can select your primary framework during setup, and switch frameworks anytime from Settings.
Dashboard Overview
The dashboard provides a real-time view of your compliance posture:
Security Score
Your security score (0-100) represents your overall compliance health:
- 90-100: Excellent - Audit ready
- 75-89: Good - Minor gaps to address
- 50-74: Fair - Several improvements needed
- Below 50: Needs attention
Key Metrics
- Controls Implemented: Number of controls marked as implemented vs. total
- Active Findings: Current security issues requiring attention
- Integrations: Connected services being monitored
- Policy Coverage: Percentage of required policies in place
Recent Activity
View real-time updates on:
- Control status changes
- New security findings
- Integration sync events
- Team member actions
Managing Controls
Controls are security requirements defined by your chosen compliance framework.
Control Statuses
- Not Started: Control not yet implemented
- In Progress: Evidence being collected
- Implemented: Control active with evidence
- Auto-Detected: Automatically verified via integrations
Implementing a Control
- Navigate to Dashboard → Controls
- Click on a control to view requirements
- Click Attest to provide implementation evidence
- Upload supporting documentation or add notes
- Submit for admin approval
Uploading Evidence
Evidence can include:
- Screenshots
- Configuration exports
- Policy documents
- Training records
- Audit logs
Supported formats: PDF, PNG, JPG, CSV, XLSX, TXT (Max 10MB)
Auto-Detection
Some controls are automatically verified through integrations:
- GitHub: Branch protection, 2FA requirements
- Google Workspace: MFA enforcement, admin settings
- Slack: Security configurations
Integrations
Integrations enable automated compliance monitoring.
Connecting GitHub
- Go to Dashboard → Integrations
- Click Connect GitHub
- Authorize the InsiderShield GitHub App
- Select repositories to monitor
- Wait for initial scan (2-5 minutes)
Monitored Settings:
- Branch protection rules
- Two-factor authentication
- Admin access controls
- Repository settings
Connecting Google Workspace
- Go to Dashboard → Integrations
- Click Connect Google Workspace
- Sign in with admin account
- Grant required permissions
- Wait for user sync
Monitored Settings:
- User MFA status
- Admin accounts
- Account recovery options
- Suspended users
Connecting Slack
- Go to Dashboard → Integrations
- Click Connect Slack
- Choose your workspace
- Authorize InsiderShield
- Configure notification preferences
Features:
- Real-time security alerts
- Finding notifications
- Weekly digest reports
Security Findings
Findings are security issues detected through integrations.
Severity Levels
- 🔴 Critical: Immediate action required
- 🟠 High: Address within 7 days
- 🟡 Medium: Address within 30 days
- 🔵 Low: Address when convenient
Resolving Findings
- Navigate to Dashboard → Findings
- Click on a finding to view details
- Review remediation steps
- Take corrective action in your system
- Re-sync integration to verify fix
Bulk Actions
- Filter by severity, integration, or status
- Mark multiple findings as acknowledged
- Export findings to CSV
- Assign findings to team members
Policies
InsiderShield helps you create and manage security policies.
Generating Policies with AI
- Go to Dashboard → Policies
- Click Generate Policy
- Select policy type (e.g., "Acceptable Use")
- Review AI-generated content
- Customize as needed
- Submit for approval
Available Policy Types:
- Acceptable Use Policy
- Information Security Policy
- Incident Response Policy
- Data Retention Policy
- Access Control Policy
- Business Continuity Policy
Uploading Existing Policies
- Go to Dashboard → Policies
- Click Upload Policy
- Select PDF file
- Choose policy type
- Submit for approval
Policy Approval Workflow
- Owner or Admin role required to approve
- Approved policies become active
- Version history maintained
- Expiration reminders available
Reports
Generate comprehensive compliance reports for audits.
Creating a Report
- Navigate to Dashboard → Reports
- Click Generate Report
- Select framework and date range
- Choose report format (PDF or HTML)
- Wait for generation (1-2 minutes)
- Download or share via link
Report Contents
- Executive summary
- Controls status overview
- Security findings snapshot
- Policy coverage
- Integration health
- Recommendations
Scheduling Reports
- Weekly: Every Monday at 9 AM
- Monthly: First day of month
- Quarterly: End of each quarter
- Custom: Define your own schedule
Team Management
Invite team members and manage access.
User Roles
- Owner: Full access including billing
- Admin: Manage controls, policies, and users
- Member: View and attest controls
Inviting Team Members
- Go to Dashboard → Settings → Team
- Click Invite Member
- Enter email address
- Select role
- Send invitation
Removing Members
- Go to Dashboard → Settings → Team
- Find team member
- Click Remove
- Confirm action
Settings
Organization Settings
- Organization name and industry
- Primary compliance framework
- Time zone and region
- Logo upload
Billing
- View current plan (Free, Pro, Enterprise)
- Upgrade or downgrade plan
- Update payment method
- View usage and limits
- Download invoices
Notifications
Configure how you receive alerts:
- Email: Immediate, daily digest, weekly summary
- Slack: Real-time notifications (requires integration)
- In-App: Always enabled
API Keys
Generate API keys for programmatic access:
- Go to Settings → API Keys
- Click Create API Key
- Enter key name and scope
- Copy key (shown only once!)
- Use in API requests
Security: Treat API keys like passwords. Never commit to version control.
Best Practices
Regular Reviews
- Review findings weekly
- Update control evidence monthly
- Sync integrations daily (automatic)
- Generate reports quarterly
Team Training
- Train team on control requirements
- Share policy documents
- Conduct compliance workshops
- Document processes
Audit Preparation
- Generate pre-audit reports
- Review all control evidence
- Update policies
- Verify integration health
- Export activity logs
Troubleshooting
Integration Not Syncing
- Check integration status in Dashboard → Integrations
- Verify OAuth permissions haven't expired
- Click Re-sync manually
- Contact support if issue persists
Control Evidence Rejected
- Review rejection reason from admin
- Provide additional documentation
- Clarify implementation details
- Resubmit for approval
Missing Permissions
- Contact your organization Owner or Admin
- Verify your email is correct
- Check spam folder for invitation
- Request role change if needed
Getting Help
- In-App Chat: Click chat icon in bottom right
- Email: support@insidershield.io
- Documentation: docs.insidershield.io
- Status Page: status.insidershield.io
Keyboard Shortcuts
Cmd/Ctrl + K: Open command paletteG then D: Go to DashboardG then C: Go to ControlsG then F: Go to FindingsG then P: Go to Policies?: Show keyboard shortcuts
Need more help? Contact our support team at support@insidershield.io