Scout Secured empowers administrators to protect their environments, regardless of scale. Whether securing a home network, managing a small business, or supporting a company-wide deployment, this documentation provides the foundation for lasting cybersecurity maturity.
Purpose
This documentation helps administrators adopt Scout Secured in a way that strengthens both their network and their broader security program. It provides the knowledge needed to deploy Scout services effectively, maintain oversight of connected devices, and build consistent protection across every location.
Each section is written to guide administrators toward a more resilient and transparent security posture that fits their unique environment.
Security Maturity Levels
Scout Secured’s approach to security maturity is inspired by the NIST Cybersecurity Framework (CSF) and CIS Critical Security Controls (Implementation Groups): two widely recognized standards used by organizations worldwide.
The following four levels translate those frameworks into practical milestones suitable for homes, shops, and organizations of any size.
| Level | Description | Industry Alignment | Color Tag |
|---|---|---|---|
| Level 1: Foundation | Establishes the core of a secure environment by deploying Scout routers, enabling VPN protection, and connecting key devices. Focus is on visibility and secure connectivity. | NIST Tier 1 (Partial) / CIS IG1 | 🟢 Green |
| Level 2: Visibility | Expands awareness through monitoring and reporting. Administrators begin reviewing metrics such as incidents, device status, and blocked domains to understand network behavior. | NIST Tier 2 (Risk-Informed) / CIS IG1–2 | 🟡 Yellow |
| Level 3: Control | Introduces governance and policy enforcement. DNS rules, password policies, and IPS actions are tuned to align security posture with organizational goals. | NIST Tier 3 (Repeatable) / CIS IG2 | 🟠 Orange |
| Level 4: Optimization | Focuses on continuous improvement and measurable performance. Administrators refine detection, shorten response times, and use data to drive risk-based decisions. | NIST Tier 4 (Adaptive) / CIS IG3 | 🔵 Blue |
Each documentation page indicates which maturity level it supports, helping administrators focus on topics appropriate to their current stage and plan for the next.
Using the Maturity Framework
- Home users often start at Level 1 (Foundation), focusing on secure setup and content filtering.
- Shop owners typically progress into Level 2 (Visibility) and Level 3 (Control) as they manage devices and enforce access policies.
- Larger organizations may aim for Level 4 (Optimization), integrating Scout data into broader security programs or compliance objectives.
This maturity structure provides a clear path from basic protection to adaptive, intelligence-driven security management.
What Scout Secured Provides
Scout Secured integrates several essential security services into a single platform that protects every device connected through it:
- VPN: Creates encrypted, private network access for users at home or on the road.
- Blackhole: Filters unwanted or malicious content at the DNS level, blocking ads, trackers, and harmful domains.
- Sentry: Monitors network traffic for intrusions and actively prevents attacks.
- Vault: Safely stores and manages credentials using strong encryption.
Together, these tools form a complete network defense system that grows with the administrator’s needs.
How This Documentation Is Organized
- Getting Started: Initial setup for routers, accounts, and connectivity.
- Features: Overviews of Scout’s services and how they strengthen security.
- Dashboard Reference: Detailed explanations of each metric and card, including maturity-level relevance.
- Settings: Configuration options for organization, devices, and policies.
- Help: Support and troubleshooting resources.
Building Toward Security Maturity
Scout Secured is designed to help every administrator improve their cybersecurity posture over time.
- Identify your current level.
- Review documentation relevant to that stage.
- Apply best practices to progress to the next level.
Each improvement builds toward stronger protection, clearer visibility, and greater control of your digital environment.