CloudDefense.AI's Cloud Identity Entitlement Management (CIEM) helps govern your Cloud Identities and effectively minimize the risk that they impose on your organization by revealing unused identities, and identities with excessive or risky privileges.
View Identity Details:
View Risks associated with an Identity:
The top of the identity intelligence page gives the user an overview of the
- Number of identities
- Number of users
- Number of services
- 3rd Party Identities
- Federated Identities
etc. of the cloud account with an evaluation of the severity level of the IAM user and role.
The identity intelligence page has 5 filters to filter the data and findings of IAM users and roles
- IAM type filter
- Severity filter
- Services filter
- Label filter
- Last activity filter
Also, users can spot the
- All the IAM users and roles
- Their last activity
- Service used by IAM users and role
- Findings for IAM users and role
IAM type filter:
The user can spot the result of the identity intelligence page by IAM type. Users can have a separate view of IAM user and IAM roles by IAM type filter
The user can spot the result of the Identity intelligence page by the impact of severity as well. 4 severity parameters are available on the identity intelligence page e.g. Critical severity, High severity, Medium severity, and low severity.
A IAM user might take several services in a platform e.g.Amazon Managed Service for Prometheus, Amazon EC2, Amazon Route 53 Domains, AWS CloudWatch RUM, Amazon Connect Voice ID, etc. So our users can also see the result of finding the page by service taken by the IAM user.
Label filter allows the user to spot the result of the identity intelligence page by its label e.g. MFA, No MFA, Admin, EC2 elevated permission, 3rd party, etc.
Last activity filter:
Last activity filter allows the user to select a date range and spot the result within the date range.
All IAM users and roles:
IAM column of the identity intelligence page allows the user to see all the IAM users and roles.
Last activity column allows the user to spot the data of the last activity of the IAM user and role.
The service column allows the user to spot the number of services taken by the IAM user. Also, it has a modal view to spot the service.
Finding column allows the user to spot the number of finding generated for the IAM user and role. It has a brief modal view and a detailed modal view. By clicking on the finding number user can see a brief view of the modal.
Also, Finding has a details view in the modal. By clicking on the IAM user and role, our user can see the detail about the finding so that the user can take necessary action regarding the findings.
Again the user can spot more information about the IAM user and role on the modal e.g. general info, credentials info, policy attaches info, etc.
The permission tab of the modal allows the user to spot the resource and service of the IAM user and their role in the graph view
Was this article helpful?
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
We appreciate your effort and will try to fix the article