Security

The Security Page provides the ability to view and manage anything that relates to aspects of the System.

Managing the System

The Security section of the system is where one would manage the following items:

  1. 👥Users

    • This is the collection of users in both the IIS and the Administrator Portal

  2. 🏷️Groups

    • This is the collection of policy groupings in relation to users of the system.

    • This helps define what policies are grouped together, and which groupings are applied to particular users

  3. 👮Policies

    • This is the collection of permissions that can provisioned to a user or a group. This permission allows users or groups to perform or restrict from performing specific functions within the system

  4. 💻Devices

    • This is the collection of devices connected to the system.

    • Devices can be tablets, mini-PCs, desktop, etc... which are provisioned to connect as the the IIS or Admin Portal

  5. 🖥️Applications

    • This is the collection applications which communicate with the system.

  6. 🗃️Provenance

    • This provides insights to the source of the information or the source of the last update/delete request to the object (i.e. a piece of data denoted by the system).

    • Note: the Provenance page will illustrate a more high-level detail

      • A more detailed log of what was done by the user/service can be viewed within the Audit Repository

    • Provenance will show:

      • The User which executed the action

      • The application which was used to execute the action

      • The device which was used to execute the action

      • During which session the action was executed

  7. 🫱Audit Repository

    • This provides an collection of audits done by the system for actors performing actions within the system

      • Actors are any service or user that acts on a record within the system

    • When an action is performed on a record, this access is detailed within the Audit Repository, and the following is recorded:

      • 🤚Action

        • The list of actions that the system allows is:

          • Execute - When an actor performs an action within the system

          • Creation - When an actor creates a new record within the system

          • Read - When an actor views a record from the system

          • Update - When an actor updates a record from the system

          • Delete- When an actor removes a record from the system

      • 🎬Event

        • The list of events that the system allows is:

          • Security Alert

          • Authentication

          • Import Data

          • Export Data

          • Query

          • Network Activity

          • Application Activity

      • 📊Outcome

        • The list of outcomes that the system allows is:

      • Timestamp

        • This is the date and time referring to the instance when the record was accessed, modified, or removed

      • 👤Actor

        • This contains information related to the user, the application, device, etc...


Security Dashboard

The Security Dashboard provides panels about the system in which the user can interact with.

Panels in the Security Dashboard

The Security Dashboard is a visualization page which illustrates the following:

  1. 👥Users

    • How many users are in the system?

  2. 🏷️Groups

    • How many groups are in the system?

  3. 💻Devices

    • How many devices are connected to the system?

  4. 🖥️Applications

    • How many applications are connected to the system?

  5. 🪟Audit Snapshot

    • ☯️Pie Graph of Event Types

      • This is a pie graph representing the percentage of all Event Types that have been collected and recorded by the system

      • When hovering over a particular slice of the pie graph (i.e. the Event Type), a count of all the audit records pertaining that Event Type will be displayed

    • 📈Audits by Date

      • This is a line graph which represents the count of all audits over the course of a month

      • Over the last month, this graph can indicate:

      • #️⃣how often the system was used and,

      • #️⃣how often records within the system were created, modified, or deleted

    • 📈Audits by Hour

      • This is a line graph which represents the count of all audits over the course of an hours

      • Over the last hour, this graph can indicate:

      • #️⃣how often the system was used and,

      • #️⃣how often records within the system were created, modified, or deleted

Last updated