Review Identity Analysis
Identity Analysis provides a unified location to explore principals, federated users, and their associated details including cloud accounts, permissions, high-level Insight Summary details, and more. You'll be able to:
- Identify and prioritize cloud identity risk through key risk indicators like overly permissive access and privilege escalation.
- Narrow the scope of your assessment with tools for search & filtering and explore detailed information for individual principals/federated users.
- Review permission usage summaries and remediation to take action on identified risks.
- Assess federated users’ roles and permissions for customers using Azure AD.
Prerequisites
Before getting started with Identity Analysis you will need:
- A functioning InsightCloudSec installation
- One or more successfully onboarded cloud account(s)
- For customers using AWS
- Differential Cache must be enabled (this is enabled by default for SaaS/hosted customers)
- LPA for AWS should be configured. Read more under the AWS LPA Setup documentation.
- For customers using Azure
- LPA should be configured. Read more under the Azure LPA Setup documentation.
- For customers using GCP
- LPA is set up automatically. Read more about this feature in the GCP LPA Usage documentation.
Customers using the Federated User Analysis feature
This is only currently available for customers using Microsoft Entra ID for user federation into AWS. InsightCloudSec is actively working on extending the Identity Provider support. The following prerequisites apply:
- The Azure cloud account with Microsoft Entra ID data available is successfully onboarded
- AWS configuration enabled as above
For more context, please review this article from AWS.
Explore Identity Analysis
In InsightCloudSec, navigate to Security > Identity Analysis to start viewing your identity-related data. This feature is divided into two tabs:
- Principals -- This tab contains the principals found across all of your onboarded cloud accounts.
- Federated Users -- This tab contains the federated users found across all of your onboarded cloud accounts.
Filter
Identity Analysis has filtering functionality to effectively narrow the scope of and navigate the data.
Add Filter
Filtering allows for narrowing the scope of the resources list using properties like cloud accounts, clusters, resource groups, etc. Some things to note about filtering behavior:
- Each selected filter updates dynamically with options appropriate for the property selected.
- After selecting an initial property, click + Add Filter to add an additional filter and further narrow the scope.
- If filtering on a Resource Tag:
- Searching for a tag is case insensitive.
- New tags are harvested every 12 hours by the
ResourceTypeTrigramsProcess
background job (see System Settings for more information).
To add a filter:
- Click the Add Filters button to open the side panel.
- Select and configure a property to get started.
- After configuring your desired filters, click Apply to update the scope for the feature.
Save Filters (Optional)
After Adding a Filter, you can save it so that it can easily be reused the next time you access the feature. Saved filters are feature-specific (since options vary between features), i.e., a saved filter in Feature "A" will only be available in Feature "A" and will not be available in Feature "B".
To save a filter:
- Once filter(s) have been applied, ensure the filters list is expanded by clicking the arrow (>)
- Click the ellipsis (...) button, then click Save Filter.
- Provide a name for the filter and an optional description.
- Select the checkbox for Set as Default Filter to set this filter as the default for the feature. This only applies to your user account and will not affect other users' default filter.
- Select the checkbox for Make this a Public Filter to allow other users to use and see the filter.
- Click OK.
Once a filter has been successfully saved, it can be accessed (along with other saved filters) or edited from the same ellipsis menu.
Trends and Analytics (Principals Only)
The Trend and Analytics section comprises charts that summarize critical details for your principals (not supported for federated users yet). Currently this section features two charts:
- Risk Factors -- The most common risk factors in your environment as well as the count of principals affected by the factor
- Click a Risk Factor to automatically configure the filters to scope the Data Display to the selected risk factor, e.g., clicking the Multi-Factor Authentication Disabled risk factor will add the filter Risk Factor is in mfa_disabled.
- Click Clear All in the Filters section to clear all filters and reset the view
- Click a Risk Factor to automatically configure the filters to scope the Data Display to the selected risk factor, e.g., clicking the Multi-Factor Authentication Disabled risk factor will add the filter Risk Factor is in mfa_disabled.
- Unused Permissions Distribution -- The count of principals that have unused permissions allocated to them (grouped in 20% chunks).
- Click an Unused Permissions Distribution to automatically configure the filters to scope the Data Display to the selected group, e.g., clicking the Under 20% group will add the filters Unused Permission Percentage greater than 0 and Unused Permission Percentage less than or equal to 20
Data Display
Below the Trends and Analytics is the main table of data. The value at the top of the table displays the total principals/federated users, but this value will update to reflect the number of principals/federated users scoped by any configured filters.
Details | Tab | Description |
---|---|---|
Search | Both | Field that enables free text search of the filtered data. |
Permissions | Both | Displays a visualization of permissions with different colors for the quantity of unused, used, and unassessed permissions. Un-assessed permissions do not appear in the graph, but their count will be displayed in the tooltip if you hover on the graph.
|
Action | Both |
|
Principal Name | Principals | The name of the principal.
|
Principal Type | Principals | The principal type for the associated principal. Currently Cloud Role and Cloud User are supported. |
Cloud Account | Principals | The type of cloud account as well as the account name for the associated principal.
|
Insight Summary | Principals | Displays highest criticality available (for example if the principal is only associated with an Insight (or Insights) with a Medium severity, that is what will display in the Insights Summary).
|
Privilege Escalation | Principals | Displays a visual indicator for privilege escalation for the selected principal, options include none, N/A (where no data is available), and a flag to indicate that the principal may have issues around privilege escalation.
|
Federated User | Federated Users | The name of the federated user.
|
User Type | Federated Users | The user type for the associated user. Currently Member and Guest are supported. |
Identity Provider | Federated Users | The identity provider for the associated user. |
Roles Assumed | Federated Users | The count of unassumed roles and the count of assumed roles.
|
Context Details
Selecting an individual principal/federated user by clicking its name or by selecting View Context Details under Actions opens a detail view for the selected principal/federated user.
Principal/Federated User Detail Availability
For each individual principal/federated user available in Identity Analysis the context details will vary.
- Areas that are not applicable and/or those that do not contain data will be inactive
- Depending on the principal/federated user, different context details are available
This view includes information like:
- Resource Properties
- Related Resources
- Permissions and Remediation
- Roles and Permissions