Access Monitoring

Veza monitors activity by identities and roles on key resources to identify over-privileged permissions, right-size roles, and trim unneeded access and entitlements to sensitive resources.

Why use Veza

Key Benefits
  • Track Activity to achieve Least Privilege: Know what resources users have actually accessed rather than just what they are entitled to access.
  • Identify Over-Permissioned Access Risks: Identify and focus on managing your most overprivileged users, roles, and resources.
  • Remove Unused Access: Identify and remove unnecessary or dormant access to resources.
  • Mitigate Permission Risk: Right-size permissions for users.
  • Save Cloud Costs: Remove access to resources which are never used.
  • Respond Rapidly: Speed up post-incident forensics by identifying what resources an attacker actually accessed.
Key Features
  • Monitor Activity: Collect and process audit logs data from Snowflake, AWS, Azure, and other services.
  • Over-Provisioned Access Score (OPAS): Synthesize different access operations (e.g. read, delete, update) across any set of resources into a single numeric activity score to help you compare levels of activity for roles and users.
  • Access Stats: Show if, and exactly how many times, an identity has accessed a resource, and the exact time of the most recent access.
  • Access Intelligence: Power rules and alerts with activity scores. For example: automatically create a workflow whenever Veza detects a new over-privileged user.
  • Cloud Entitlements Dashboard: New dashboard for Security Engineering and Security Operations teams on most active users, dormant users, dormant roles, and more.

Learn more about Access Monitoring