Overview
The IT Admin role is designed for administrators who manage the platform’s underlying infrastructure and authentication methods. To protect the organization's security posture, this role follows a strict Security Silo model, providing full operational capability without exposure to sensitive vulnerability data or risk metrics.
Key Access Characteristics:
Direct Redirection: Upon login, IT Admins are automatically redirected to the Settings page, which serves as their primary workspace.
Security Partitioning: IT Admins cannot be added to engagements, view findings, or receive scheduled security reports.
Navigation Guardrails: Navigation items for restricted areas (such as Maturity or Findings) are completely hidden from the interface to prevent unauthorized access attempts.
Interface and Navigation Visibility
To ensure the IT Admin is only exposed to relevant operational areas, the platform’s interface is partitioned into visible and hidden elements.
Location | Visible Items | Hidden (Restricted) Items |
Left Navigation Bar | Integrations tab, Support button | Dashboards, Reports, Assessments, Operations, and Auditing tabs |
Settings Menu | User Profile, Company Profile, Account & 2FA, Access Tokens, Notifications | Maturity, Cost of Breach, Likelihood, Threat Source, Business Asset, Members and Groups |
Top-Right Menu Bar | Knowledge Base button | Notifications bell, CYE AI Chatbot |
Settings Menu: Functional Capabilities
While the Settings tab is the primary workspace, the following table defines the specific operational tasks an IT Admin is authorized to perform within that menu.
Feature Area | IT Admin Access | Purpose / Restriction |
Integrations & Workflows | Allowed | Setup and management of AWS, Jira, MS Defender, etc. |
Security Tools | Allowed | Configuration of connected platform security tools. |
Workflow Automations | Allowed | Creating and managing automated triggers and actions. |
Authentication & 2FA | Allowed | Managing account security, SSO, and login methods. |
Access Tokens | Allowed | Generating and managing API keys for integrations. |
Company & User Profile | Allowed | Basic organizational details and personal profile data. |
Infrastructure Management Responsibilities
Infrastructure management is a shared responsibility between Platform Administrators and IT Admins. Both roles are authorized to perform the following:
Add or manage platform integrations.
Configure Single Sign-On (SSO), such as Okta, under Settings → Company Profile.
Manage API Access Tokens and system-wide Workflow Automations.
Wrap-up/Next Steps
The IT Admin role ensures that the platform's infrastructure is maintained without compromising the integrity of the security assessment.
Strategic Takeaways:
Operational Independence: IT Admins possess the necessary tools for infrastructure setup without involvement in engagement-level security tasks.
Access Protection: Strict silos prevent deep-linking to restricted areas like Findings or Maturity scores.
Separation of Duties: By hiding security-centric tabs and restricting data visibility, the platform ensures that IT operations cannot inadvertently alter security logic or expose sensitive vulnerability data.
