Access Reviews

Automate user access certifications – creating comprehensive campaigns in record time. Certify with confidence by prioritizing risky access first and giving reviewers the context they need to approve or reject.

Why use Veza

Key Benefits
  • Rapid Deployment: Get started in minutes with hundreds of agentless integrations. Compile campaigns instantly.
  • Trusted Certifications: Stop guessing about abstract role names. Veza’s effective permissions translates system permissions into simple terms: Create, Read, Update, Delete.
  • Efficiency: Focus on reviewing access with the greatest risk by prioritizing privileged accounts, toxic combinations and separation of duties violations.
  • Comprehensive Reviews: Accurately reveal all accounts with access, including local, machine, and service accounts, even if they exist outside your identity platforms.
Key Features
  • Access Reviews: Create campaigns to review the permissions of any human or machine user, or for any resource, such as an S3 bucket or Snowflake table.
  • Review Delegation: Automatically assign reviewers to the user’s manager or the owner of the resource.
  • Smart Actions: Bulk certify access based on customizable conditions such as last-modified, time limits, recent usage, and separation-of-duties (SOD).
  • Review Intelligence: Automate review suggestions based on past decisions.
  • Enterprise Scale: Conduct hundreds of access reviews for all of your systems at once for large compliance programs.
  • API Access: Programmatically create access reviews, view, or update certifications, and integrate with existing review tools.

Introducing Advanced Access Reviews

ADVANCED FEATURES
  • Advanced Review Intelligence automation: Automate reviewer actions, such as approve, reject, or sign-off, for entities matching pre-defined and custom policies
  • Access Intelligence integration: Focus reviewers on the riskiest users, entitlements, and resources by incorporating risk scores and risk levels into your reviews
  • Role Analytics: Give reviewers a clear understanding of access granted per role, including resource counts, access levels, and risk
ADVANCED FEATURES
  • Activity Insight: Identify whether a user’s entitlement is actively being used, not just if they’ve logged into the application, enabling confident removal of unused entitlements.
  • On-demand reviews: Event-driven microcertifications triggered as critical security, user mobility, or privilege escalation events occur.
  • Multi-level sign-off: Support for multiple reviewers who both must sign-off on an access review prior to completion and certification.