Creating a Workspace
Workspaces are the foundation of how you organize work in Hawkra. Each workspace is an isolated environment for a specific security assessment, penetration test, or client engagement. Everything within a workspace -- assets, networks, vulnerabilities, credentials, notes, compliance data, and team members -- is scoped to that workspace and kept separate from your other projects.
How It Works
When you create a workspace, Hawkra provisions an isolated environment with its own encryption key for sensitive data. The user who creates the workspace automatically becomes the Owner and has full control over every aspect of it.
Each workspace tracks:
- Assets and Networks -- The hosts, devices, and network segments you are assessing.
- Vulnerabilities -- Findings linked to specific assets, with severity levels and remediation status.
- Credentials -- Encrypted credentials used during the assessment.
- Notes and Documents -- Supporting documentation for the engagement.
- Compliance Data -- Framework-based compliance tracking and evidence.
- Audit Log -- A complete record of all actions taken within the workspace.
Workspaces also have a lifecycle status: Active, Completed, or Archived. Only active workspaces allow modifications. Completed workspaces can be reactivated, but archived workspaces are permanently read-only.
Key Actions
Creating a New Workspace
- From the main dashboard, click the Create Workspace button.
- Fill in the required fields:
- Name -- A descriptive name for the workspace (1-255 characters).
- Client Name (optional) -- The name of the client or organization being assessed.
- Description (optional) -- A summary of the engagement scope or objectives (up to 5,000 characters).
- Start Date (optional) -- The planned start date for the assessment.
- End Date (optional) -- The planned end date for the assessment.
- Click Create to provision the workspace.
You will be taken to the new workspace automatically. Hawkra generates a unique encryption key for the workspace behind the scenes, so all sensitive data stored within it is encrypted at rest from the start.
The number of workspaces you can create depends on your subscription tier. If you reach your limit, you will need to upgrade your plan or delete an existing workspace. Self-hosted deployments may also have a global workspace limit set by the license.
Navigating Between Workspaces
Use the workspace selector in the top navigation bar to switch between your workspaces. The selector displays all workspaces you are a member of, along with summary statistics (total networks, assets, and vulnerability counts) so you can quickly identify the workspace you need.
Workspace Roles
Every workspace member has a role that determines what they can do. Hawkra uses four workspace roles:
| Role | Description |
|---|---|
| Owner | Full control over the workspace. Can manage team members, customize the dashboard, delete the workspace, and rotate encryption keys. Every workspace has exactly one owner -- the user who created it. |
| Editor | Can view and edit assets, vulnerabilities, networks, and other workspace data. Cannot manage team members or delete the workspace. Requires a Premium subscription. |
| Remediation Analyst | Can view all workspace data and edit vulnerability statuses (for tracking remediation progress). Cannot edit assets or manage the team. Requires a Premium subscription. |
| Viewer | Read-only access to all workspace data. Can view assets, vulnerabilities, networks, and the audit log, but cannot make any changes. Available on all subscription tiers. |
Assign the Editor role to team members who need to actively contribute findings and edit data. Use Remediation Analyst for stakeholders who need to track and update remediation progress without modifying the assessment data itself. Use Viewer for clients or stakeholders who only need to review results.
Tips and Notes
- One owner per workspace -- Ownership is set at creation and cannot be transferred to another user through the UI. If you need to change ownership, contact support.
- Workspace isolation -- Data in one workspace is completely invisible to members of other workspaces. A user must be explicitly invited to access a workspace.
- Encryption -- Each workspace has its own Data Encryption Key (DEK). Owners can rotate this key from workspace settings for additional security.
- Status transitions -- When a workspace is marked as Completed or Archived, all pending invitations are automatically cancelled.