Cloud Infrastructure Entitlement Management

Cortex® Cloud gives you control over permissions across multicloud environments

Identity and Access Management Security Front

Overly permissive roles, poor credential hygiene and accidental public exposure have all caused significant breaches of enterprise cloud environments.

Monitor permissions and continuously enforce least-privileged access

Cloud Infrastructure Entitlement Management (CIEM) provides users with broad visibility into effective permissions, continuously monitors multicloud environments for risky and unused entitlements, and automatically makes least privilege recommendations. Users gain simple yet powerful insight into which identities have access to critical infrastructure – including those associated with an IdP provider – all seamlessly integrated into Cortex Cloud.
  • Query permissions across users, compute instances, cloud resources and more
  • Monitor excessive and unused privileges
  • Automate remediation of overly permissive roles
  • Net-effective permissions
    Net-effective permissions
  • Rightsizing permissions
    Rightsizing permissions
  • IAM entitlement investigation
    IAM entitlement investigation
  • IDP integration
    IdP integration
  • Automated remediation
    Automated remediation
SOLUTION

Our approach to Cloud Infrastructure Entitlement Management

Net-effective permissions

Gain comprehensive visibility into who can take what actions on which resources. CIEM is purpose-built to directly solve the challenges of managing permissions across AWS, Azure, and GCP. Cortex Cloud automatically calculates users' effective permissions across cloud service providers, detects overly permissive access, and suggests corrections to reach least privilege.

  • Manage multicloud entitlements from a single solution

    Gain integrated multicloud capabilities delivered from Cortex Cloud that extend everything we do for Cloud Security Posture Management (CSPM) to cloud identities.

  • Implement pre-built policies

    Leverage specialized out-of-the-box policies to detect risky permissions and remove unwanted access to cloud resources.

  • Audit permissions for internal compliance

    Quickly audit cloud permissions with related user data, service data and cloud accounts.

Net-effective permissions

Rightsizing permissions

Specialized out-of-the-box policies detect risky permissions and help remove unwanted access to cloud resources. Automatically detect overly permissive user access, and then leverage automated recommendations to rightsize them to achieve least-privileged access.

  • Detect overly permissive policies

    Remove unwanted access to cloud resources by automatically detecting overly permissive access policies.

  • Implement pre-built policies

    Use out-of-the-box policies to detect public access, use of wildcards, risky permissions and more.

  • Automated recommendations

    Use automated recommendations to achieve least privilege permissions.

Rightsizing permissions

IAM entitlement investigation

Query all relevant IAM entities, including all the relationships among different entities and their effective permissions across cloud environments. Understand which user can take what actions on which resources on which cloud. Turn queries into custom cloud-agnostic policies and define remediation steps as well as compliance implications.

  • Investigate IAM entitlements

    See real-time and historical data to understand IAM activity and entitlements.

  • Query data to get the full picture of user activity

    Gain a detailed view of suspicious activity as well as connected accounts and resources.

  • Query data specific to identity providers

    Discover overly permissive roles of IdP users and correlate results with cloud identities, such as IAM users and machine identities.

IAM entitlement investigation

IdP integration

Integrate with identity provider (IdP) services like Okta, Azure AD and AWS IAM Identity Center to ingest single sign-on (SSO) data. View effective permissions and overly permissive roles of IdP users, and correlate results with cloud identities, such as IAM users and machine identities.

  • Leverage integrated support for IdP Services

    Ingest single sign-on (SSO) data for permissions mapping and calculate the effective permissions of IdP users across multicloud accounts.

  • Query data specific to identity providers

    Discover overly permissive roles of IdP users and correlate results with cloud identities, such as IAM users and machine identities.

  • Turn queries into cloud-agnostic policies

    Easily build custom guardrails for IdP users by turning RQL queries into IAM security policies with specific compliance and remediation implications.

IDP integration

Automated remediation

Automatically adjust permissions and continuously enforce least-privileged access. Send alert notifications to 14 third-party tools, including email, AWS Lambda and Security Hub, PagerDuty®, ServiceNow® and Slack®.

  • Activate automated remediation for over-privileged users

    Get suggestions for ideal permissions levels for any cloud user from Cortex Cloud.

  • Support for 14 common integrations

    Seamlessly integrate Cortex Cloud alerting with your existing alert management tools with built-in support for 14 third-party tools.

  • Remediation playbooks

    Leverage custom Cortex® XSOAR playbooks for Cortex Cloud and easily operationalize advanced security orchestration capabilities.

Automated remediation

Additional Cloud Posture Security capabilities

Cloud Security Posture Management

Remove your most critical risk across public and multicloud environments with Cortex Cloud.

Data Security Posture Management

Discover, classify and protect sensitive data in cloud environments.

AI Security Posture Management

Identify and address vulnerabilities in the AI supply chain.

Vulnerability Management

Ruthlessly prioritize and remediate vulnerabilities with code to cloud to SOC context.