Access Control Matrix
Application User Roles
Function | Admin | Project Coordinator | Library Moderator | Client / Consultant |
---|---|---|---|---|
Global Dashboard | ||||
| Yes | Yes | Yes | Yes |
Analytics | ||||
| Yes | Yes | Yes | Yes |
Vulnerabilities | ||||
| Yes | Yes | Yes | Yes |
Portfolios | ||||
| Yes | No | No | No |
| Yes | Based on configuration | Based on configuration | Based on configuration |
| Yes | Based on configuration | Based on configuration | Based on configuration |
Projects | ||||
| Yes | Yes | Yes | Yes |
| Yes | No | No | No |
| Yes | No | No | No |
| Yes | Yes | Based on configuration | Based on configuration |
| Yes | Yes (for projects user has access to) | Based on configuration | Based on configuration |
| Yes | No | No | No |
| Yes | No | No | No |
| Yes | Yes (for projects user has access to) | Based on configuration | Based on configuration |
| Yes | Yes (for projects user has access to) | Based on configuration | Based on configuration |
| Yes | Yes | Yes | Yes |
| Yes | Yes | Based on configuration | Based on configuration |
| Yes | Yes | Based on configuration | Based on configuration |
Scheduling | ||||
| Yes | Yes | Yes | Yes |
| Yes | No | No | No |
Assets (if enabled) | ||||
| Yes | Based on configuration | Based on configuration | Based on configuration |
| Yes | Based on configuration | Based on configuration | Based on configuration |
| Yes | Based on configuration | Based on configuration | Based on configuration |
| Yes | Based on configuration | Based on configuration | Based on configuration |
| Yes | Based on configuration | Based on configuration | Based on configuration |
| Yes | Based on configuration | Based on configuration | Based on configuration |
| Yes | Based on configuration | Based on configuration | Based on configuration |
| Yes | Based on configuration | Based on configuration | Based on configuration |
| Yes | Yes | No | No |
| Yes | Yes only for vulnerabilities and assets user has access to | Yes only for vulnerabilities and assets user has access to | Yes only for vulnerabilities and assets user has access to |
| Yes | No | No | No |
Writeups | ||||
| Yes | Based on configuration | Based on configuration | Based on configuration |
| Yes | Based on configuration | Based on configuration | Based on configuration |
| Yes | Based on configuration | Based on configuration | Based on configuration |
| Yes | Based on configuration for each library | Based on configuration for each library | Based on configuration for each library |
| Yes | No | No | No |
Test Suites | ||||
| Yes | Yes | No | No |
Groups | ||||
| Yes | No | No | No |
| Yes | Based on configuration per group | Based on configuration per group | Based on configuration per group |
Users | ||||
| Yes | No | No | No |
Self-Service API | ||||
| Yes | Yes | Yes | Yes |
| Yes (for APIs user has been given access to) | Yes (for APIs user has been given access to) | Yes (for APIs user has been given access to) | Yes (for APIs user has been given access to) |
| Yes (for APIs user has been given access to) | Yes (for APIs user has been given access to) | Yes (for APIs user has been given access to) | Yes (for APIs user has been given access to) |
Reporting Templates | ||||
| Yes | Yes | No | No |
Attack Chains | ||||
| Yes | Yes | Yes | Yes |
Administration | ||||
| Yes | No | No | No |
Project Privileges
Function | Admin | Project Coordinator | Edit | Upload | View |
---|---|---|---|---|---|
Project | |||||
| Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Based on configuration per project | Based on configuration per project | Based on configuration per project |
| Yes | Yes | Yes | Based on configuration per project | Based on configuration per project |
| Yes | Yes | Based on configuration per project | Based on configuration per project | Based on configuration per project |
| Yes | No | Yes | No | No |
| Yes | Yes | Yes | No | No |
| Yes | Yes | No | No | No |
| Yes | Yes | No | No | No |
Scope / Assets | |||||
| Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | No | No |
Testing | |||||
| Yes | Yes | Yes | Yes | Yes |
| Yes | No | Yes | No | No |
| Yes | Yes | No | No | No |
| Yes | Yes | No | No | No |
| Yes | No | Yes | No | No |
Retesting | |||||
| Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes |
| Yes | No | Yes | No | No |
| Yes | Yes | Yes | Yes | Yes |
Vulnerabilities | |||||
| Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | No | No |
| Yes | No | Yes | No | No |
| Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes |
| Yes | No | Yes | No | No |
| Yes | No | Yes | No | No |
| Yes | No | Yes | No | No |
| Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | No | No | No |
| Yes | Yes | No | No | No |
| Yes | Yes | No | No | No |
| Yes | Yes | Yes | Yes | Yes |
Attack Chains | |||||
| Yes | Yes | Yes | Yes | Yes |
| Yes | No | Yes | No | No |
Reporting | |||||
| Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes |
| Yes | Yes | Based on configuration | Based on configuration | Based on configuration |
| Yes | No | Based on configuration | No | No |
| Yes | No | Yes | No | No |
Daily Tracking | |||||
| Yes | Yes | Yes | Yes | Yes |
Collaboration | |||||
| Yes | Yes | Yes | Yes | Yes |
Workspace | |||||
| Yes | No | Yes | Yes | No |
| Yes | No | Yes | No | No |
| Yes | No | Yes | No | No |
| Yes | No | Yes | Yes, however can only see own notes | No |
Last updated