Security

The Security Page provides the ability to view and manage anything that relates to aspects of the System.

circle-info

Managing the System

The Security section of the system is where one would manage the following items:

  1. 👥Users

    • This is the collection of users in both the IIS and the Administrator Portal

  2. 🏷️Groups

    • This is the collection of policy groupings in relation to users of the system.

    • This helps define what policies are grouped together, and which groupings are applied to particular users

  3. 👮Policies

    • This is the collection of permissions that can provisioned to a user or a group. This permission allows users or groups to perform or restrict from performing specific functions within the system

  4. 💻Devices

    • This is the collection of devices connected to the system.

    • Devices can be tablets, mini-PCs, desktop, etc... which are provisioned to connect as the the IIS or Admin Portal

  5. 🖥️Applications

    • This is the collection applications which communicate with the system.

  6. 🗃️Provenance

    • This provides insights to the source of the information or the source of the last update/delete request to the object (i.e. a piece of data denoted by the system).

    • Note: the Provenance page will illustrate a more high-level detail

      • A more detailed log of what was done by the user/service can be viewed within the Audit Repository

    • Provenance will show:

      • The User which executed the action

      • The application which was used to execute the action

      • The device which was used to execute the action

      • During which session the action was executed

  7. 🫱Audit Repository

    • This provides an collection of audits done by the system for actors performing actions within the system

      • Actors are any service or user that acts on a record within the system

    • When an action is performed on a record, this access is detailed within the Audit Repository, and the following is recorded:

      • 🤚Action

        • The list of actions that the system allows is:

          • Execute - When an actor performs an action within the system

          • Creation - When an actor creates a new record within the system

          • Read - When an actor views a record from the system

          • Update - When an actor updates a record from the system

          • Delete- When an actor removes a record from the system

      • 🎬Event

        • The list of events that the system allows is:

          • Security Alert

          • Authentication

          • Import Data

          • Export Data

          • Query

          • Network Activity

          • Application Activity

      • 📊Outcome

        • The list of outcomes that the system allows is:

      • Timestamp

        • This is the date and time referring to the instance when the record was accessed, modified, or removed

      • 👤Actor

        • This contains information related to the user, the application, device, etc...


Security Dashboard

The Security Dashboard provides panels about the system in which the user can interact with.

circle-info

Panels in the Security Dashboard

The Security Dashboard is a visualization page which illustrates the following:

  1. 👥Users

    • How many users are in the system?

  2. 🏷️Groups

    • How many groups are in the system?

  3. 💻Devices

    • How many devices are connected to the system?

  4. 🖥️Applications

    • How many applications are connected to the system?

  5. 🪟Audit Snapshot

    • ☯️Pie Graph of Event Types

      • This is a pie graph representing the percentage of all Event Types that have been collected and recorded by the system

      • When hovering over a particular slice of the pie graph (i.e. the Event Type), a count of all the audit records pertaining that Event Type will be displayed

    • 📈Audits by Date

      • This is a line graph which represents the count of all audits over the course of a month

      • Over the last month, this graph can indicate:

      • #️⃣how often the system was used and,

      • #️⃣how often records within the system were created, modified, or deleted

    • 📈Audits by Hour

      • This is a line graph which represents the count of all audits over the course of an hours

      • Over the last hour, this graph can indicate:

      • #️⃣how often the system was used and,

      • #️⃣how often records within the system were created, modified, or deleted

Last updated