Audiences

New Operator

Start here if you are doing hands-on security work and need to understand scope, workflows, evidence, and escalation.

This page defines the operator lane for hands-on security execution under governed scope, approval, and evidence rules.

1. Problem this page solves

Operators lose control of risk when execution starts before scope, approval boundaries, and evidence requirements are explicit.

This page gives the first-pass operating path so execution decisions stay auditable and proportional.

2. What you should understand after reading

After this page, you should understand:

  • the operator role boundary: execute in-scope work, capture evidence, escalate at boundaries
  • what to read first before running technical steps
  • which execution decisions you own
  • what to treat as observed evidence vs inferred conclusion
  • what to defer until after the first operating cycle

3. Mechanism-first role path

Read first (in order)

  1. Getting Started
  2. Authorization Model
  3. Operations
  4. Evidence
  5. Is This In Scope?
  6. Do I Need to Escalate?
  7. What Evidence Is Required?

Decisions you own in this role

DecisionWhat you ownPrimary pages
Scope checkConfirm each target and action remains in approved scope before executionAuthorization Model, Is This In Scope?
Workflow selectionChoose the least disruptive runbook path that can answer the objectiveOperations, Runbooks
Evidence sufficiencyCollect enough traceable evidence to support or reject the claimEvidence, What Evidence Is Required?
Escalation triggerStop and escalate when scope, approval, or impact certainty breaksDo I Need to Escalate?

Defer initially

Defer these until your first governed workflow is complete:

  • integration implementation details in Integration Author
  • low-level receipt field references in Receipt Spec
  • scenario pages not tied to the current assignment

4. Observed vs inferred

LayerWhat is observedWhat is inferred
Execution and evidencescope gate allow/deny outcomes, approval events, command/tool output, timestamps, receipt-linked artifactsroot cause, exploitability, business impact, attacker intent
Failure handlingexplicit governed failures (approval stall, tool crash, evidence hash mismatch)confidence that the investigation is complete

Treat inferred conclusions as conclusions. Do not record them as direct observations.

5. Role-specific trust assumptions

Operate with these assumptions explicit:

  • Scope enforcement is driven by in-scope.txt. If configuration is wrong, enforcement boundaries are wrong.
  • Approval behavior follows workflow and external policy. Paused approvals do not auto-resolve.
  • Runtime integrity (host, keys, toolchain) is assumed. Host compromise invalidates governance guarantees.
  • Tool output quality is not validated by receipt generation. Receipts can attest execution of incorrect tool output.
  • Receipt guarantees prove what ran and what was captured, not whether your conclusion is correct.

See Threat Model for the complete trust boundary map.

6. Next-page handoff

Next, read Defender for the triage and containment path that follows operator-led execution.