View a list and description of system reports
Permissions Management has various types of system reports that capture specific sets of data. These reports allow management, auditors, and administrators to:
- Make timely decisions.
- Analyze trends and system/user performance.
- Identify trends in data and high risk areas so that management can address issues more quickly and improve their efficiency.
This article provides you with a list and description of the system reports available in Permissions Management. Depending on the report, you can download it in comma-separated values (CSV) format, portable document format (PDF), or Microsoft Excel Open XML Spreadsheet (XLSX) format.
Download a system report
In the Permissions Management home page, select the Reports tab, and then select the Systems Reports subtab.
In the Report Name column, find the report you want, and then select the down arrow to the right of the report name to download the report.
Or, from the ellipses (...) menu, select Download.
The following message displays: Successfully Started To Generate On Demand Report.
Summary of available system reports
|Report name||Type of the report||File format||Description||Availability||Collated report?|
|Access Key Entitlements and Usage Report||Summary Detailed||CSV||This report displays: - Access key age, last rotation date, and last usage date availability in the summary report. Use this report to decide when to rotate access keys. - Granted task and Permissions creep index (PCI) score. This report provides supporting information when you want to take the action on the keys.||AWSAzureGCP||Yes|
|All Permissions for Identity||Detailed||CSV||This report lists all the assigned permissions for the selected identities.||Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP)||N/A|
|Group Entitlements and Usage||Summary||CSV||This report tracks all group level entitlements and the permission assignment, PCI. The number of members is also listed as part of this report.||AWS, Azure, or GCP||Yes|
|Identity Permissions||Summary||CSV||This report tracks any, or specific, task usage per User, Group, Role, or App.||AWS, Azure, or GCP||No|
|NIST 800-53||Detailed Summary Dashboard||CSV PDF||Dashboard: This report helps track the overall progress of the NIST 800-53 benchmark. It lists the percentage passing, overall pass or fail of test control along with the breakup of L1/L2 per Auth system. Summary: For each authorized system, this report lists the test control pass or fail per authorized system and the number of resources evaluated for each test control. Detailed: This report helps auditors and administrators to track the resource level pass or fail per test control.||AWS, Azure, or GCP||Yes|
|PCI DSS||Detailed Summary Dashboard||CSV||Dashboard: This report helps track the overall progress of the PCI-DSS benchmark. It lists the percentage passing, overall pass or fail of test control along with the breakup of L1/L2 per Auth system. Summary: For each authorized system, this report lists the test control pass or fail per authorized system and the number of resources evaluated for each test control. Detailed: This report helps auditors and administrators to track the resource level pass or fail per test control.||AWS, Azure, or GCP||Yes|
|PCI History||Summary||CSV||This report helps track Monthly PCI History for each authorized system. It can be used to plot the trend of the PCI.||AWS, Azure, or GCP||Yes|
|Permissions Analytics Report (PAR)||Summary||This report helps monitor the Identity Privilege related activity across the authorized systems. It captures any Identity permission change. This report has the following main sections: User Summary, Group Summary, Role Summary & Delete Task Summary. The User Summary lists the current granted permissions along with high-risk permissions and resources accessed in 1-day, 7-day, or 30-days durations. There are subsections for newly added or deleted users, users with PCI change, high-risk active/inactive users. The Group Summary lists the administrator level groups with the current granted permissions along with high-risk permissions and resources accessed in 1-day, 7-day, or 30-day durations. There are subsections for newly added or deleted groups, groups with PCI change, High-risk active/inactive groups. The Role Summary and the Group Summary list similar details. The Delete Task summary section lists the number of times the Delete Task has been executed in the given period.||AWS, Azure, or GCP||No|
|Permissions Analytics Report (PAR)||Detailed||CSV||This report lists the different key findings in the selected authorized systems. The key findings include Super identities, Inactive identities, Over-provisioned active identities, Storage bucket hygiene, Access key age (AWS), and so on. This report helps administrators to visualize the findings across the organization and make decisions.||AWS, Azure, or GCP||Yes|
|Role/Policy Details||Summary||CSV||This report captures Assigned/Unassigned and Custom/system policy with used/unused condition for specific or all AWS accounts. Similar data can be captured for Azure and GCP for assigned and unassigned roles.||AWS, Azure, or GCP||No|
|User Entitlements and Usage||Detailed
|CSV||This report provides a summary and details of User entitlements and usage. Data displayed on Usage Analytics screen is downloaded as part of the Summary report. Detailed permissions usage per User is listed in the Detailed report.||AWS, Azure, or GCP||Yes|
- For information on how to view system reports in the Reports dashboard, see View system reports in the Reports dashboard.
- For information about how to create, view, and share a system report, see Create, view, and share a custom report.
- For information about how to create and view a custom report, see Generate and view a custom report.
- For information about how to create and view the Permissions analytics report, see Generate and download the Permissions analytics report.
Submit and view feedback for