Identity Security Assessment Dashboard

Cisco Identity Intelligence's Identity Security Assessment (ISA) rapidly delivers unmatched visibility across all identities within your organization. The ISA is designed to quickly identify identity risks across critical infrastructure and consolidate key areas of focus into an easy to consume export. The assessment leverages API-based integrations with selected providers from your identity stack to ensure there is no impact on production systems and requires no agent deployment.

The pre-defined ISA Dashboard information is incredibly useful as you begin your journey with Identity Intelligence, but also serves as a valuable point of reference to compare progress as you continue to leverage the platform and take action on the various insights presented.

circle-info

Note: collecting and analyzing historical data may take some time depending on the size of your identity environment. After successful integration, Cisco Identity Intelligence may need up to 14 days to fully stabilize the data.

To access this Dashboard, navigate to the Cisco Identity Intelligence dashboard and select the ISA Reports tab from the top navigation bar.

The ISA Reports Dashboard aggregates data from all the connected sources in your tenant and organizes it by focus area into 3 sections:

You can drill into the value in any of the counters and certain visualizations to see more details, such as the list of impacted users, by clicking into the item of interest. You can either use the default ISA Reports Dashboard or you can tailor it to your preferences.

IAM Hygiene

This section emphasizes the critical role of maintaining strong Identity and Access Management (IAM) practices to enhance your organization's identity security and proactively combat threats. This includes managing user access effectively, auditing permissions regularly, and removing dormant accounts to reduce security risks and prevent unauthorized access.

You can select values from certain

MFA Analysis

This section provides an overview of your organization's Multi-Factor Authentication (MFA) adoption and assesses the effectiveness of the MFA methods in use, based on the NIST guidelines. It offers a clear evaluation of the security strength of each authentication method, helping organizations understand the robustness and reliability of their MFA implementation, while also surfacing any gaps or areas to improve.

Threats Insights & Unusual Activity

This section of the dashboard centers on identifying suspicious activities associated with user trust levels. Each check can be explored in detail to review failure criteria, recommended remediation steps, affected users, and additional context. By associating these checks with user trust levels, this data provides meaningful insight into active security risks, and the related security gaps, enabling you to prioritize and focus your efforts effectively. This approach helps clarify where vulnerabilities exist and guides targeted actions to proactively enhance the organization's identity security.

Customizing and Sharing Your ISA Report

Like the other Dashboard tabs, the ISA Reports Dashboard can be customized to meet your needs, and exported for easy sharing. Please refer to our Dashboard overview article for more info.

Last updated