Skip to main content

The IT Admin Role: Operational Silo and Interface Access

Understand the IT Admin's operational silo, including infrastructure management capabilities and interface restrictions designed to protect security data.

Updated today

Overview

The IT Admin role is designed for administrators who manage the platform’s underlying infrastructure and authentication methods. To protect the organization's security posture, this role follows a strict Security Silo model, providing full operational capability without exposure to sensitive vulnerability data or risk metrics.


Key Access Characteristics:

  • Direct Redirection: Upon login, IT Admins are automatically redirected to the Settings page, which serves as their primary workspace.

  • Security Partitioning: IT Admins cannot be added to engagements, view findings, or receive scheduled security reports.

  • Navigation Guardrails: Navigation items for restricted areas (such as Maturity or Findings) are completely hidden from the interface to prevent unauthorized access attempts.


Interface and Navigation Visibility

To ensure the IT Admin is only exposed to relevant operational areas, the platform’s interface is partitioned into visible and hidden elements.

Location

Visible Items

Hidden (Restricted) Items

Left Navigation Bar

Integrations tab, Support button

Dashboards, Reports, Assessments, Operations, and Auditing tabs

Settings Menu

User Profile, Company Profile, Account & 2FA, Access Tokens, Notifications

Maturity, Cost of Breach, Likelihood, Threat Source, Business Asset, Members and Groups

Top-Right Menu Bar

Knowledge Base button

Notifications bell, CYE AI Chatbot


Settings Menu: Functional Capabilities

While the Settings tab is the primary workspace, the following table defines the specific operational tasks an IT Admin is authorized to perform within that menu.

Feature Area

IT Admin Access

Purpose / Restriction

Integrations & Workflows

Allowed

Setup and management of AWS, Jira, MS Defender, etc.

Security Tools

Allowed

Configuration of connected platform security tools.

Workflow Automations

Allowed

Creating and managing automated triggers and actions.

Authentication & 2FA

Allowed

Managing account security, SSO, and login methods.

Access Tokens

Allowed

Generating and managing API keys for integrations.

Company & User Profile

Allowed

Basic organizational details and personal profile data.


Infrastructure Management Responsibilities

Infrastructure management is a shared responsibility between Platform Administrators and IT Admins. Both roles are authorized to perform the following:

  • Add or manage platform integrations.

  • Configure Single Sign-On (SSO), such as Okta, under Settings → Company Profile.

  • Manage API Access Tokens and system-wide Workflow Automations.


Wrap-up/Next Steps

The IT Admin role ensures that the platform's infrastructure is maintained without compromising the integrity of the security assessment.

Strategic Takeaways:

  • Operational Independence: IT Admins possess the necessary tools for infrastructure setup without involvement in engagement-level security tasks.

  • Access Protection: Strict silos prevent deep-linking to restricted areas like Findings or Maturity scores.

  • Separation of Duties: By hiding security-centric tabs and restricting data visibility, the platform ensures that IT operations cannot inadvertently alter security logic or expose sensitive vulnerability data.

Did this answer your question?