GuidesStep-by-step instructions for common tasks. Deploy packages, configure signing, set up new services.
RunbooksOperational procedures for incidents and maintenance. Break-glass access, on-call response, recovery steps.
ReferenceTechnical details, architecture diagrams, and configuration. Fleet MDM infrastructure, secrets inventory.
ConceptsExplanations of how systems work together. Identity flows, security architecture, design decisions.