Skip to main content
This reference provides complete details on all ContraForce roles, their permissions, and guidance on when to use each role.
ContraForce uses a two-tier role system: Organization Roles control platform-wide access, while Workspace Roles control what users can do within specific customer workspaces.

Role System Overview

ContraForce roles operate at two levels:

Organization Roles

Control who can access the platform and manage organization-wide settings. Assigned in Settings → User Management.

Workspace Roles

Control what actions users can perform within a specific customer workspace. Assigned per-workspace in Workspace Settings.

How Roles Work Together

A user needs both an organization role AND a workspace role to work effectively:
Organization Role → Grants platform access
        +
Workspace Role → Grants workspace-specific permissions
        =
Complete user access
A user with an organization role but no workspace role can log in but won’t see any customer data. A user must be assigned to at least one workspace with a workspace role to be useful.

Organization Roles

Organization roles are assigned at the partner/organization level and determine platform-wide capabilities.

Organization Roles Summary

RoleDescriptionTypical Users
Organization AdminFull platform control including billing, settings, and user managementBusiness owners, IT directors, platform administrators
Organization MemberStandard platform access, can be assigned to workspacesSOC analysts, engineers, account managers

Organization Admin

Full administrative control over the ContraForce platform.
CapabilityAccess
View organization dashboard
Manage organization settings
Create and delete workspaces
Add and remove organization users
Create and manage organization groups
Assign users to workspaces
View billing and usage
Manage API keys
Configure SSO/authentication
Access all workspaces (with workspace role)
  • Platform administrators responsible for ContraForce setup
  • Business owners who need full visibility
  • IT directors managing the security operations team
  • Personnel responsible for billing and licensing
  • Limit to 2-3 trusted individuals
  • Ensure at least two Organization Admins for continuity
  • Document who has this role and why
  • Review quarterly for appropriateness

Organization Member

Standard platform access for team members who work within workspaces.
CapabilityAccess
View organization dashboard
Manage organization settings
Create and delete workspaces
Add and remove organization users
Create and manage organization groups
Assign users to workspaces
View billing and usage
Manage API keys
Configure SSO/authentication
Access assigned workspaces (with workspace role)
  • SOC analysts handling daily incident triage
  • Security engineers managing integrations
  • Account managers reviewing customer status
  • Any team member who doesn’t need admin capabilities
  • Default role for most team members
  • Combine with appropriate workspace roles
  • Add to organization groups for easier workspace assignment

Workspace Roles

Workspace roles control what a user can do within a specific customer workspace. Users can have different roles in different workspaces.

Workspace Roles Summary

RoleView IncidentsRespond to IncidentsManage GamebooksConfigure ModulesManage Users
Admin
Incident Responder
Incident Analyst
Data Source Admin
Content AdminCMS Only

Admin

Full control over a workspace including user management and configuration.
Incident Management
CapabilityAccess
View incidents
View incident details and entities
Update incident status
Update incident severity
Assign incidents
Add comments
Close incidents
Delete incidents
Response Actions
CapabilityAccess
Run Gamebooks
Create custom Gamebooks
Execute response actions
Isolate endpoints
Disable user accounts
Block IPs/URLs
Configuration
CapabilityAccess
Configure modules
Manage data connectors
Configure notifications
Manage CMS rules
Deploy detection rules
Administration
CapabilityAccess
Add users to workspace
Remove users from workspace
Assign workspace roles
Add groups to workspace
View workspace settings
Modify workspace settings
  • SOC managers overseeing a specific customer
  • Lead analysts with full responsibility for a workspace
  • Customer success managers who need to configure workspaces
  • Technical account managers during onboarding
  • Assign to SOC managers and team leads
  • Limit to personnel who need user management capabilities
  • Consider using Incident Responder instead if user management isn’t needed
  • Appropriate for your most senior analysts on premium customers

Incident Responder

Can investigate incidents and execute response actions, but cannot configure the workspace.
Incident Management
CapabilityAccess
View incidents
View incident details and entities
Update incident status
Update incident severity
Assign incidents
Add comments
Close incidents
Delete incidents
Response Actions
CapabilityAccess
Run Gamebooks
Create custom Gamebooks
Execute response actions
Isolate endpoints
Disable user accounts
Block IPs/URLs
Configuration
CapabilityAccess
Configure modules
Manage data connectors
Configure notifications
Manage CMS rules
Deploy detection rules
Administration
CapabilityAccess
Add users to workspace
Remove users from workspace
Assign workspace roles
Add groups to workspace
View workspace settingsLimited
Modify workspace settings
  • Tier 2 SOC analysts who handle escalations
  • Senior analysts who need to take response actions
  • Incident handlers during active investigations
  • On-call personnel who may need to respond after hours
  • Default role for experienced SOC analysts
  • Appropriate for personnel who need response capabilities
  • Use for Tier 2 and above analysts
  • Consider for on-call rotation members

Incident Analyst

Read-only access to incidents for monitoring and analysis without response capabilities.
Incident Management
CapabilityAccess
View incidents
View incident details and entities
Update incident status
Update incident severity
Assign incidents
Add comments
Close incidents
Delete incidents
Response Actions
CapabilityAccess
Run Gamebooks
Create custom Gamebooks
Execute response actions
Isolate endpoints
Disable user accounts
Block IPs/URLs
Configuration
CapabilityAccess
Configure modules
Manage data connectors
Configure notifications
Manage CMS rules
Deploy detection rules
Administration
CapabilityAccess
Add users to workspace
Remove users from workspace
Assign workspace roles
Add groups to workspace
View workspace settings
Modify workspace settings
  • Tier 1 SOC analysts who triage and escalate
  • Customer stakeholders who want visibility into their incidents
  • Compliance officers reviewing security events
  • Account managers monitoring customer status
  • Junior analysts in training
  • Use for Tier 1 analysts who escalate rather than respond
  • Appropriate for customer users who need read-only access
  • Good for personnel in training before promoting to Responder
  • Use for account managers who need visibility without action capability

Data Source Admin

Can configure modules and data connectors but cannot respond to incidents.
Incident Management
CapabilityAccess
View incidents
View incident details and entities
Update incident status
Update incident severity
Assign incidents
Add comments
Close incidents
Delete incidents
Response Actions
CapabilityAccess
Run Gamebooks
Create custom Gamebooks
Execute response actions
Isolate endpoints
Disable user accounts
Block IPs/URLs
Configuration
CapabilityAccess
Configure modules
Manage data connectors
Configure notifications
Manage CMS rules
Deploy detection rules
Administration
CapabilityAccess
Add users to workspace
Remove users from workspace
Assign workspace roles
Add groups to workspace
View workspace settings
Modify workspace settingsLimited
  • Integration engineers setting up data connectors
  • Technical onboarding specialists
  • Engineers troubleshooting data flow issues
  • Personnel responsible for module configuration
  • Use for technical staff who configure but don’t respond
  • Appropriate for onboarding and integration work
  • Good for separation of duties (config vs. response)
  • Consider for customer IT admins managing their own connectors

Content Admin

Can manage CMS detection rules but cannot configure other modules or respond to incidents.
Incident Management
CapabilityAccess
View incidents
View incident details and entities
Update incident status
Update incident severity
Assign incidents
Add comments
Close incidents
Delete incidents
Response Actions
CapabilityAccess
Run Gamebooks
Create custom Gamebooks
Execute response actions
Isolate endpoints
Disable user accounts
Block IPs/URLs
Configuration
CapabilityAccess
Configure modules
Manage data connectors
Configure notifications
Manage CMS rules
Deploy detection rules
Enable/disable rules
Configure auto-updates
Administration
CapabilityAccess
Add users to workspace
Remove users from workspace
Assign workspace roles
Add groups to workspace
View workspace settingsLimited
Modify workspace settings
  • Detection engineers managing rule deployments
  • Security engineers tuning detection coverage
  • Personnel responsible for Sentinel rule management
  • Content specialists focused on detection quality
  • Use for personnel focused specifically on detection rules
  • Good for separation of duties (detection vs. response)
  • Appropriate for detection engineering teams
  • Consider pairing with Incident Analyst for visibility

Role Comparison Matrix

By Functional Area

CapabilityAdminResponderAnalystData SourceContent
View incidents
View details/entities
Update status
Update severity
Assign incidents
Add comments
Close incidents
Delete incidents

Common Role Assignments

By Team Structure

Team MemberOrg RoleTypical Workspace Role
SOC ManagerOrganization AdminAdmin
Tier 2 AnalystOrganization MemberIncident Responder
Tier 1 AnalystOrganization MemberIncident Analyst
Detection EngineerOrganization MemberContent Admin
Integration EngineerOrganization MemberData Source Admin
Account ManagerOrganization MemberIncident Analyst
Customer CISO— (workspace only)Incident Analyst
Customer IT Admin— (workspace only)Data Source Admin

By Customer SLA

SLA TierRecommended Team Roles
PremiumAdmin (manager) + Incident Responder (analysts)
StandardIncident Responder (lead) + Incident Analyst (analysts)
BasicIncident Analyst (monitoring only)

Best Practices

Assign the minimum role needed for each user’s responsibilities. Start with Incident Analyst and promote to Responder only when response capabilities are needed.
Create organization groups like “SOC Tier 1” and “SOC Tier 2” with predetermined workspace roles. This ensures consistency across all customer workspaces.
Consider separating Data Source Admin and Content Admin roles from incident response roles. This provides better audit trails and separation of duties.
Reserve the Admin role for personnel who genuinely need user management capabilities. Most analysts should be Incident Responders or Incident Analysts.
Maintain a record of who has what role and why. Review quarterly to ensure assignments are still appropriate.
A user can have different roles in different workspaces. A senior analyst might be Admin for a premium customer but Incident Responder for standard customers.

Frequently Asked Questions

No, each user has one role per workspace. However, they can have different roles in different workspaces. If a user needs capabilities from multiple roles, assign the higher-privilege role.
Admin can manage users and modify workspace settings. Incident Responder has the same operational capabilities (investigating, responding) but cannot add/remove users or change configuration.
Generally no. Customer users should only be added at the workspace level (not organization level) to ensure they can only see their own data.
Custom roles are not currently supported. Use the predefined roles that best match your needs. Contact support if you have specific requirements not met by existing roles.
Go to the workspace settings, find the user in Users & Groups, edit their assignment, and change their role from Incident Analyst to Incident Responder.
Incident Analyst is typically appropriate for customer stakeholders who need visibility into their security posture without the ability to take response actions.


Questions about roles and permissions? Contact us at [email protected].