Skip to main content

Roles and Permissions in Hyver

Learn how platform roles, engagement roles, special permissions, and finding-level sharing combine to control what users can see and do in Hyver.

Updated over 2 weeks ago

Overview

Permissions in Hyver are determined through a layered access model.
Each layer controls a different aspect of visibility or capability:

  • Platform access

  • Engagement membership

  • Role within an engagement

  • Special permissions

  • Finding-level sharing

Users must have the correct configuration at every layer to perform specific actions such as creating findings or editing the mitigation graph.


Permission Hierarchy

Level

Controls

Platform Role

Organization-wide access and administrative capabilities.

Engagement Access

Determines which specific engagements are visible to the user.

Engagement Role

Defines the actions a user can take within an assigned engagement.

Special Permissions

Grants advanced capabilities (e.g., modifying the graph).

Finding Share Permission

Controls access to individual, specific findings.

Each level builds on the one before it.


Platform Roles

Apply across the entire organization.

Administrator

  • Full platform access

  • Can manage users, integrations, threat sources, and business assets

  • Can configure SSO

Power User

  • Can create engagements

  • Automatically becomes Engagement Administrator of created engagements

  • Still requires engagement-level permissions to create findings or edit the graph

  • Needs Findings & Graph Initiator to work with the mitigation graph

User

  • Read-only access to dashboards and exports

IT Admin (Operational Specialist)

The IT Admin role follows the principle of least privilege. It is designed for IT administrators who need to operationalize the platform (set up integrations, SSO, etc.) without exposure to sensitive security data.

  • Login Experience: Upon login, IT Admins are redirected directly to the Settings page.

  • Security Silo: IT Admins are strictly excluded from all security layers:

    • No Engagement Membership: They cannot be added to engagements or appear in the "Members & Groups" tab.

    • No Visibility to Finding: Findings are not visible to IT Admins.

    • No Reporting: They are excluded from all scheduled report recipient lists.

    • Access Protection: Deep-linking to restricted pages (like Findings or Maturity) is blocked.



IT Admin: Interface & Navigation Access

Because the IT Admin role is siloed for infrastructure tasks, their view of the Hyver interface is carefully partitioned to protect the organization's security posture.

Left and Top Navigation Bars Visibility

Items are hidden, not just disabled, to ensure the IT Admin is only exposed to relevant areas.

Visible Items

Hidden (Restricted) Items

Settings (Primary Workspace)

Maturity, Cost of Breach, & Explore Page

Support Button

Industry & Expert Graphs

Knowledge Center (KC)

Dashboards & Reports

Engagements, Findings, & Assets, Plans

CYE AI Chatbot & Notifications Bell

Inside the Settings Menu: Allowed vs. Restricted Areas


For the IT Admin, the Settings tab in the left navigation bar is their primary workspace. However, access within this menu is partitioned to ensure they can manage infrastructure without altering the platform's underlying security logic.

Feature Area

IT Admin Access

Purpose / Restriction

Integrations & Workflows

Allowed

Set up and management of AWS, Jira, MS Defender, etc.

Security Tools

Allowed

Configuration of connected platform security tools.

Workflow Automations

Allowed

Creating and managing automated triggers and actions.

Authentication & 2FA

Allowed

Managing account security, SSO, and login methods.

Access Tokens

Allowed

Generating and managing API keys for integrations.

Company & User Profile

Allowed

Basic organizational details and personal profile data.

Likelihood Modeling

Restricted

Protects the core risk and probability calculation logic.

Threat Source & Business Assets

Restricted

Prevents modification of the assessment and data model.

Audit Logs

Restricted

Silos sensitive activity tracking and system logs.

User Management

Restricted

Prevents IT Admins from managing or elevating permissions.


Engagement Roles

These roles apply only within specific engagements.
Note: IT Admins cannot hold engagement roles.

Administrator

  • Full engagement control

  • Can manage users and edit content

Editor

  • Can edit existing engagement content

  • Cannot manage users

  • Cannot access the Members and Groups tab

Important:
Editors cannot create findings or modify the mitigation graph unless granted the
Findings & Graph Initiator special permission.

Viewer

  • Read-only access to the specific engagement and its exports.


Special Permissions

Extend engagement role capabilities.

Findings & Graph Initiator

Allows an Editor (or Administrator) to:

  • Create findings

  • Link findings

  • Add or delete graph edges

  • Modify mitigation graph structure

Without this permission:

  • Editors can edit existing findings

  • But cannot create new findings

  • And cannot modify the graph


Working with Findings

Viewing Findings

To view a finding, you must:

  • Be a member of the engagement

  • Have view permission for the finding

  • Have the finding shared with you

Creating Findings

Requires:

  • Editor or Administrator engagement role.

  • Findings & Graph Initiator permission

  • Membership in the relevant engagement

Finding Sharing Permissions


Each finding can be shared with:

Permission

Capability

Viewer

View and comment

Editor

Rename, create Jira tickets, import assets

Administrator

Full control over the finding


Mitigation Graph Permissions

Working with the Mitigation Graph requires a combination of permissions:

  • Platform role

  • Engagement role

  • Special permissions

  • Finding-level sharing

Viewing Findings on the Graph

To see a finding on the graph, you must:

  • Be a member of the engagement

  • Have the finding shared with you (at least View permission)

Creating Findings from the Graph

Requires:

  • Editor engagement role

  • Findings & Graph Initiator permission

  • Membership in the relevant engagement

Creating or Deleting Edges

Requires:

  • Editor engagement role

  • Findings & Graph Initiator permission

Adding Threat Sources or Business Assets


Restricted to:

  • Engagement Administrators

Editors and Power Users cannot add these — even with Findings & Graph Initiator.

Important:

A Power User platform role does not grant graph editing capability by itself.

To modify graph structure, the user must still have:

  • Editor's role in the engagement

  • Findings & Graph Initiator permission

Platform roles do not override engagement-level permissions.


Managing Integrations and SSO

Unlike other security settings, infrastructure management is shared between two roles:
Only Platform Administrators and IT Admins can:

  • Add or manage integrations

  • Configure SSO (e.g., Okta) under Settings → Company Profile.

  • Manage API Access Tokens and Workflow Automations.


Wrap up/ Next step

To ensure security and operational efficiency, keep these three principles in mind:

  1. Independence of Roles: Platform roles and engagement roles are independent. For example, a Power User (Platform) must still be granted Editor permissions (Engagement) to work within a specific assessment.

  2. Cumulative Access: No single role grants full authority. Every action depends on the combined configuration of your platform role, engagement role, and any special permissions (like the Findings & Graph Initiator).

  3. The IT Admin Exception: The IT Admin is the only role that exists in a complete "Security Silo." It is a dedicated operational lane that can manage the "pipes" of the platform (Integrations/SSO) while remaining strictly partitioned from the security analysis and data exposure.

Did this answer your question?