How to Check for Least Privilege with Cyscale’s New Identity Dashboard

The Least Privilege Principle states that no user should be given more permissions and for more time than they require for their day-to-day tasks. 

Compliance with the Principle of Least Privilege (PoLP) is a security best practice in cloud security that should be implemented in all cloud environments. 

How do you implement Least Privilege? 

  • Use timed privileges; only assign privileges in the moments they are needed and revoke them after. 
  • Set up minimum permissions and add more on the go, if necessary. 
  • Remove or disable identities that haven’t been active in the last 30 days or more. 

Cyscale can help you implement the Principle of Least Privilege 

With a new, powerful identity dashboard, Cyscale helps you improve the visibility of your cloud identities and pinpoint vulnerabilities or misconfigurations. 

Using this page, you can see your organization's identities and their level of access. 

Entities that do not have permissions in the cloud but have an account are marked with the “No Access” tag on the right. 

No access permissions in dashboard

Moreover, people who have left the organization are also visible on this dashboard. It is essential to know which entities have left to ensure you have a complete offboarding process and that they no longer have permissions. 

If we expand a card of an identity that no longer exists in the company, we see that their account is disabled because it is greyed out. 

Disabled identity

To understand an identity's impact on the entire organization's environment, you must have comprehensive visibility.  

The following image shows that the analyzed user has accounts in Alibaba, AWS, Azure, Google Cloud, and Okta. Furthermore, we can see that they are part of the "Admins" group, as well as others, and as a result, are "Highly Privileged”. 

Highly privileged identity

If we expand each account’s card, we can see the environment they have access to. Besides tracking permissions, it is crucial to also track the actual environments each user has access to. In the cloud, this tends to quickly become hard to track because applications often span multiple accounts. 


Being highly privileged is not necessarily an issue, however, combining it with the lack of MFA does become a problem. Cyscale highlights this situation. This can be seen immediately after expanding a person’s card, so the vulnerability is not missed. 

In this example, the user’s Okta account does not have MFA. Okta is an identity and access management (IAM) service where you can onboard your accounts, which helps you manage your organization’s access to other applications through SSO. 

In the image below, you can see the accounts assigned using Okta. Therefore, if there is a vulnerability in your Okta account, all those accounts may be compromised. 

Okta identity

Another useful feature of the Identity Dashboard is the “Alerts” section. If an account has security alerts, the user can click on them and be redirected to the Alerts page. There, you can see failed controls along with: 

  • Severity, 
  • The asset involved, 
  • The status, and others. 

You can immediately pinpoint any misconfigurations and vulnerabilities using these alerts and quickly solve them with the remediation steps provided. 

Besides visibility, Cyscale provides controls that automatically check for misconfigurations. 

There are over 400 controls currently available in Cyscale. A few examples of controls that verify you’re implementing the Least Privilege Principle correctly are: 

  • Eliminate use of the "root" user for administrative and daily tasks for AWS 
  • Ensure that ServiceAccount has no Admin privileges for Google Cloud Platform 
  • Ensure IAM policies that allow full "*:*" administrative privileges are not created for AWS 
  • Ensure IAM Users that are inactive for 30 days or more are deactivated for AWS 

Interesting? Share it

Stay Connected

Receive our latest blog posts and product updates.

Our Compliance toolbox

Check out our compliance platform for cloud-native and cloud-first organizations:

CSPM ToolMulti-Cloud Data SecurityGoogle Cloud SecurityAWS Security & ComplianceIAM Cloud SecurityPrevent Cloud Misconfiguration

LATEST ARTICLES

What we’re up to

NIST CSF 2.0: A Detailed Roadmap for Modern Cybersecurity
Key Cloud Security Lessons from 2023's High-Profile Breaches
What are Non-Human Identities (NHIs), and how do we secure them?
Cyscale Logo
Cyscale is an agentless cloud-native application protection platform (CNAPP) that automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Stay connected

Receive new blog posts and product updates from Cyscale

By clicking Subscribe, I agree to Cyscale’s Privacy Policy


© 2024 Cyscale Limited

crunch base icon
angel icon