Audit Permissions

Review who has what permissions, identify over-privileged users, ensure least privilege, prepare for compliance audits.

Permission Audit Workflow

Step 1: List All Roles

Bash
Copy

Review each role's permissions.

Step 2: Check User Permissions

Bash
Copy

Step 3: Identify Over-Privileged Users

Red flags:

  • Users with admin roles who shouldn't have them
  • Users with write access who only need read
  • Contractor with same access as employees
  • Users with permissions from multiple conflicting roles

Step 4: Generate Permission Matrix

UserRolesCan CreateCan DeleteCan AdminReview Status
user-123viewerAppropriate
user-124adminOver-privileged

Step 5: Remediate Issues

Bash
Copy

APIs Used

  1. GET /authz/api/v1/roles - All roles
  2. GET /authz/api/v1/users/:userId/roles - User roles
  3. GET /authz/api/v1/users/permissions - Effective permissions
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard