Identities report
  • 7 minutes to read
  • Dark
    Light
  • PDF

Identities report

  • Dark
    Light
  • PDF

Article summary

This document provides information about the Identities report screen. This report shows information about access permissions, unauthorized identity access, recommendations, and entities.

Path to access

  1. Access Cloud Security.
  2. Access the Cloud Entitlements product.
  3. In the Cloud Entitlements menu, click Identities.

Within the report, you'll find the following information for each identity:

ItemDescription
Cloud Service ProviderDisplays an icon representing the associated CSP for the identity. This column is shown by default.
Cloud IDDisplays the Cloud ID according to the provider. This column must be enabled manually.
EnvironmentDisplays the name of the environment within Cloud Entitlements associated with the identity. This column is shown by default.
TypeDisplays the identity type. This column is shown by default.
PrincipalDisplays the name of the identity within the CSP. This column is shown by default.
ScoreDisplays the value to calculate the Impact field. This column must be enabled manually.
ImpactDisplays the risk level associated with the identity's impact on your environment. The impact level is categorized from A to E, with A representing the lowest impact and E representing the highest. This column is shown by default.
Total issueDisplays the total of recommendations linked to this identity. This column must be enabled manually.
RecommendationsDisplays the number of recommendations linked to the identity separated by criticality levels. The criticality levels are indicated by colors: Red indicates high, Orange indicates medium, and Yellow indicates low. This column is shown by default.
Last scan checkDisplays the exact date and time when the synchronization with the identity occurred. This column must be enabled manually.
Creation DateDisplays the creation date of this identity. This column must be enabled manually.
SubtypeDisplays if the user is a member or a guest. This column must be enabled manually. Note: This column is only available for AWS identities.
Alert

If an AWS account access key is no longer valid, a red alert will be displayed next to the account icon, and as a result, the date and time of the last scan synchronization will no longer be updated.

Info

Cloud Entitlements scans the environments every 4 to 10 minutes.

Use the search bar at the top of the report to look for a specific identity. In the upper-right corner, you can also export the report in .csv format, and show or hide columns.

Next to the search bar, you'll find filters that allow you to filter the report based on the following table:

FilterDescription
ProviderFilters the identities by their provider. The options are: AWS, GCP, Azure, and Oracle. This filter is shown by default.
EnvironmentFilters the identities by their environments. This filter is shown by default.
TypeFilters the identities by their type. The options are: User, Group, Roles, and Application. This filter is shown by default.
RecommendationsFilters the identities by their criticality level. You can select multiple levels of criticality at the same time. The levels are: High, Medium, Low, and Info. This filter is shown by default.
SubtypeFilters the identities by their subtype. The options are: Member and Guest. This filter is only shown if the Subtype column is enabled.
Identities in a groupFilters the identities according to whether the principal is part of a group or not. This filter is shown by default.
AdministratorFilters the identities according to whether the principal is an administrator or not. This filter is shown by default.

By clicking on a specific identity, it opens a new panel with more detailed information about the identity.

Identities section

ItemDescription
Entity typeType of entity. The options are: User, Group, Roles, Application, and Service account.
GroupGroup that the user belongs to.
ARNUnique identifier for the AWS entity. This field is only visible for AWS entities.
Has admin accessShows if the entity has administrator access.
Connected accountShows if the entity has an account connected to it.

Recommendations tab

ItemDescription
RecommendationsShows all recommendations that are recommended to be modified.
CompliantShows all recommendations that are in compliance with the provider.

Findings tab

This tab varies according to the provider of the identity selected, see the following tables for each provider:

Findings tab for Amazon Web Services

Service usage

ItemDescription
ServiceName of the service.
PolicyPolicy attached to the identity and a service.
DateDate when the service was last used.

This section has a Search button, and a Date filter to help users find the services.

Policies

ItemDescription
+ AddButton to add a temporary policy. This button is only available if your account integration mode is Read and Write. More information in How to set temporary policies for AWS identities.
PolicyPolicy attached to the identity.
TypeType of policy. The types are: Group policy and Attached policy.
Expiration dateExpiration date of the temporary policy.
RemoveButton to remove a temporary policy.

This section has a Search button to help users find the policies.

Findings tab for Azure

Subscription resources

ItemDescription
SubscriptionSubscription resource identifier.
ResourceName of the resource.
TypeType of the resource.
RolesRole attached to the user allowing access to the subscription resource.
ActionsActions to be executed on the resource.

This section has a Search button to help users find the subscriptions.

Members

This section only appears if the identity is a group.

ItemDescription
MembersMembers of the group.
TypeType of the members.

Auth method

This section only appears if the identity is a user.

ItemDescription
Auth methodLists the various authentication methods associated with the identity.

Roles

ItemDescription
NameName of the role assigned to the user.
Direct assignmentDisplays if the role was assigned directly to the user.
TypeDisplays the type of role assigned to the user.
RemoveButton to remove a temporary policy.

This section has a Search button to help users find the roles.

Findings tab for Google Cloud Provider

Roles

ItemDescription
RolesRole assigned to the identity.
TypeType of the role assigned to the identity. The options are: Basic role, Predefined role and Custom role.

This section has a Search button to help users find the roles.

Services

ItemDescription
ServiceService assigned to the identity.
DateDate when the service was used.

This section has a Search button, and a Date filter to help users find the services.

Access key

This section is only visible if the identity is a service account.

ItemDescription
Key IDID of the key.
Key creation dateCreation date of the key.
Key expiration dateExpiration date of the key.

This section has a Search button to help users find the roles.

Findings tab for Oracle Cloud

Statement

ItemDescription
EffectSets if the policy allows or denies the access.
SubjectThe subject of the policy that specifies groups or principals that the policy grants permission to.
VerbThe type of access. The options are: inspect, read, use, and manage.
Resource typeThe type or resource to which the policy applies.
LocationThe policies' scope of access to a compartment or tenancy.
ConditionConditions that return resources based on specified parameters.

This section also has a Search button to help users find the statements.

API keys

This section is only visible if the identity is a User.

ItemDescription
FingerprintFingerprint of the key.
Created dateCreation date of the API key.

This section also has a Search button to help users find the API keys.

Groups

ItemDescription
OIDCGroup's Oracle Cloud ID.
MemberGroup's members.

This section also has a Search button to help users find the groups.

Access path tab

The Access path provides users with a comprehensive view of the relationships between identities and the services they interact with. In essence, it provides a visual representation of how an identity is connected to specific services and permissions, making it easier to identify potential security vulnerabilities or unauthorized accesses.

ItemDescription
FilterField to filter elements on the map. When a term matches the inserted pattern, the elements are visually highlighted.
SettingsButton to expand the map configuration options.
LayoutsField to select the map model. The options are: Radial out 2D, Force directed 2D, and Force directed 3D.
Zoom inButton to zoom in on the map.
Zoom outButton to zoom out on the map.
Reset cameraButton to reset the zoom to the initial state. It doesn’t change the chosen layout.
ExpandIcon to expand the tab.
CaptionField to indicate the captions for the icons.
DateField to indicate what services were accessed between a specific period of time by setting colors to the arrows.

Was this article helpful?