Table of authorized actions for users with limited access to assets
A user with limited access to assets can execute the following actions depending on its role:
Auditor | Security Administrator | System Administrator | |
---|---|---|---|
Generate an export | ✓ | ✓ | ✓ |
Consult the Vulnerabilities Encyclopedia | ✓ | ✓ | ✓ |
Update the Vulnerabilities Encyclopedia | ✓ | ||
Consult the Rules Encyclopedia | ✓ | ✓ | ✓ |
Consult compliance Benchmarks | ✓ | ✓ | ✓ |
Consult the Security Issues | ✓ | ✓ | ✓ |
Consult Ignoring policies | ✓ | ✓ | ✓ |
Consult asset rules | ✓ | ✓ | ✓ |
Consult criticalities | ✓ | ✓ | ✓ |
Consult corrective actions | ✓ | ✓ | ✓ |
Consult users’ activities | ✓ | ✓ | ✓ |
See the details of an asset | ✓ | ✓ | ✓ |
Consult the compliance rules status of an asset | ✓ | ✓ | ✓ |
Access Kibana | ✓(1) | ✓(1) | ✓(1) |
Ignore vulnerabilities on an asset | ✓ | ✓ | |
Update/Delete an asset | ✓ | ||
Create a deployment/reboot/scanning policy | ✓ | ||
Deploy security fixes on an asset | ✓ | ||
Assign assets a deployment/reboot/scanning policy | ✓ | ||
Create/Update/Delete a custom compliance repository | ✓ | ||
Assign/Remove rules to/from custom compliance repository | ✓ | ||
Recheck compliance rules on an asset | ✓ | ||
Assign/Remove compliance repositories to/from assets | |||
Update/Delete a deployment/reboot/scanning policy | |||
Create/Update/Delete a Criticality | |||
Consult Discoveries | |||
Create/Update Discoveries | |||
Add agents | ✓(2) | ||
Add agentless connections | |||
Add Docker images | |||
Add/Update/Delete network targets or websites | ✓(2) | ✓(2) | |
Add air-gapped assets | ✓(2) | ||
Consult stored credentials | |||
Create/Update/Delete stored credentials | |||
Create/Update/Delete an Ignoring Policy | |||
Create/Update/Delete a Security Issue | |||
Create/Update/Delete a custom compliance rule | |||
Create/Update/Delete an asset rule | |||
Add a compliance Benchmark | |||
Assign groups to assets | |||
Add a comment to users’ activities | |||
Manage users and rights |
(1) Requires explicit permission.
(2) Requires a group.