Roles
Users on the ARM have different roles with associated permissions relevant to work on the platform. Depending on your role, you are granted access to certain functions for your daily use of the ARM. You can see your role on the ARM in the drop-down menu that appears when you click the user icon on the upper-right part of your screen.
The following are the different roles that are available on the ARM, along with their descriptions.
User manager role
This is the role that gives the user the most privileges, this user can do everything that a client is allowed to do in the ARM. This role is made for the leaders of the product and, besides the basic privileges, it allows the user to generate reports, define important treatments like accepting vulnerabilities permanently, requesting Zero Risk treatments, adding and editing users for the group and more.
User role
This is the default user role, it is the one given to developers or the users in charge of solving the vulnerabilities. This user can check all the information about the vulnerabilities needed for solving them and also request reattacks when they deem them solved.
Vulnerability manager role
The role of vulnerability manager was designed for people with a position as technical leaders in their company. This role has access to the basic privileges on the ARM and is also enabled to generate reports; get notifications; define, change and approve treatments; request reattacks, and add tags. The vulnerability manager does not have permissions to manage roots nor add, edit or remove users.
Functions
- Add roots: This function is for adding git roots to the scope of the group being managed.
- Add tags: This is for adding tags to the group being managed which is useful for categorizing different groups in an organization.
- Add users: This function is for adding user to a group and setting their privileges.
- Approve treatments: This function is for when a treatment change is requested, as there is a need to validate and then accept or reject this request.
- Change treatments: Each vulnerability can be given a specific treatment. This function gives the ability to request the change of this treatment.
- Deactivate/Activate root:
This function allows you to:
- Deactivate repositories for which you no longer want an assessment;
- Activate repositories you want to leave available to our analysts, and
- Move a root to another group, taking all the associated vulnerabilities with it.
- Delete groups: With this function you are able to completely delete the group being managed.
- Edit roots: This function allows you to change URLs of roots that do not have reported vulnerabilities and edit root branches.
- Edit users: This option is for editing everything related to the users added to the group.
- Exclusions: This feature allows you to choose files or folders in your repository that you do not want to include in the security assessments.
- Generate a report: This feature allows you to generate and download a complete report with detailed information about the vulnerabilities of a specific group.
- Receive notifications: This is the ability to receive notifications that the ARM can send related to your group.
- Request reattacks: When a vulnerability is solved, there is the need to ask our hackers to verify that it was indeed solved. This function gives you the ability to make this kind of request.
- View vulnerabilities: The ability to view all the information available about all the vulnerabilities that the project has.
- ORG vulnerabilities download: Download your organization's vulnerabilities (including all vulnerability statuses) in a .CSV file. For more information, click here.
- OAuth connection: Connection between the providers GitLab - GitHub - Bitbucket - Azure with the ARM platform.
- Add Outside repositories: Repositories that are not yet part of any group of the organization. You can add them in bulk or as a unit in your required group.
- Edit Information: Be able to edit the group information. This section is located in Scope -> Information.
Roles table
In the following table we specify what functions are enabled for each role.
User | Vulnerability manager | User manager | |
---|---|---|---|
Add roots | X | X | |
Add tags | X | X | X |
Add users | X | ||
Approve treatments | X | X | |
Change treatments | X | X | X |
Deactivate/Activate root | X | ||
Delete groups | X | ||
Edit Information | X | ||
Edit roots | X | X | |
Edit users | X | ||
Exclusions | X | ||
Generate a certificate | X | ||
Generate a report | X | X | |
Group policies | X | ||
Receive notifications | X | X | X |
Request reattack | X | X | X |
View vulnerabilities | X | X | X |
ORG vulnerabilities download | X | ||
support channels | X | X | X |
OAuth connection | X | ||
Add Outside repositories | X | ||
Compliance Report | X | X | X |
Add ORG credentials | X | ||
ORG policies | X | ||
Add new group | X | X | X |
Notify button | X | ||
Consulting | X | X | X |
Assign vulnerabilities | X | X | X |
Agent installation | X | X | X |
Agent Token generation | X | X | X |
Request verification events | X | X | X |
Create portfolio | X | X | X |
Add secrets | X | ||
Unsubscribe groups | X | X | X |
Generate API token | X | X | X |
Internal roles
Fluid Attacks’
internal roles on the ARM.
Hacker
The hacker is a security analyst whose main objectives are identifying, exploiting and reporting vulnerabilities in organizations' systems.
Reattacker
The reattacker is in charge of verifying, through diverse techniques, the effectiveness of the solutions implemented by the organizations for vulnerability remediation.
Customer manager
The customer manager mainly provides support and streamlines processes of the organizations. For example, on the ARM, they can make changes in group information, request reattacks, generate reports and manage members, among many other things.
Resourcer
The resourcer helps keep updated the inputs provided by the organizations, such as environment credentials and mailmap authors, among others.
Reviewer
The reviewer is in charge of managing the vulnerabilities that are reported to the organizations. They evaluate drafts for approval or disapproval, request reattacks and verify and notify which vulnerabilities are zero risk.
Architect
The architect's main objective is to ensure the highest quality of ethical hacking and pentesting deliverables. Among their functions are deleting false positives or errors, including or deleting evidence, and providing help to the organizations over the support channels.
Admin
The admin is the one who has all the privileges on the ARM, except for the possibility to change treatments.
Internal roles table
In the following table, we specify what functions are enabled for each role:
Hacker | Reattacker | Resourcer | Reviewer | Architect | Customer Manager | Admin | |
---|---|---|---|---|---|---|---|
Add drafts | X | X | X | X | |||
Add events | X | X | X | X | X | X | |
Add roots | X | X | |||||
Approve drafts | X | X | |||||
Change treatments | X | X | |||||
Confirm/Reject ZR | X | X | X | ||||
Deactivate/Activate root | X | ||||||
Delete groups | X | X | |||||
Edit roots | X | X | |||||
Generate a report | X | X | X | X | |||
Manage evidences | X | X | X | ||||
Request reattack | X | X | X | X | X | X | X |
Request ZR | X | X | |||||
Solve events | X | X | X | X | X | X | |
Verify reattack | X | X | X | X |
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.