Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Veza Reports enable organization, monitoring, and action on the most critical insights for security teams and individual Veza operators.
Browse to Access Intelligence > _Reports > All Reports to view all reports. For any query in a report, you can
See the percent change, current result, or trend chart.
View the underlying query details and conditions.
Each query indicates the current result value. Click the % Change to view a trend chart.
Hide zero value results will conceal assessment queries where the value column is 0
(no current results).
To view all results in Query Builder or edit the saved query, click the Query name or value.
To refresh the query from the most recent graph data, click Run Query under the actions dropdown menu. All results automatically refresh daily.
The main Access Intelligence > Reports page allows you to organize and rank reports intended for regular review. Expand a category to view the reports within it, and click a report's name to open it. You can create additional categories, and add or remove built-in or custom reports:
Search for specific reports, labels, or integration types by applying filters.
Click + Add Category to create a grouping and Add or Create reports within it.
Reports added to the Dashboard Reports category are shown on the main dashboard.
Drag an item to arrange the report categories. You can also hide or re-categorize several reports at one time with a multi-selection.
To make reports containing many different queries more digestible, you can temporarily filter the information to show and export.
To show queries by keyword such as "MFA," "Service Account," or "Bucket", start typing into the Find queries by name field at the top of the report.
Changing the Time Range updates the minimum and maximum values to show values for that period.
Clicking a cloud provider icon within a report subcategory will show only queries for that provider (such as Okta or Azure AD).
To only show results for a subset of Azure tenants or AWS accounts, use the Select one or more accounts dropdown. This can be useful for focusing on a specific account of interest among several similar provider integrations.
To export a report to CSV or PDF, click Export and select an option. The data export will include columns for Name
, Value
, Min_Range
, Max_Range
, and Time_Range
, for the currently-filtered set of queries.
Browse to Access Intelligence > Reports.
Click + Create Report.
Give the report a Name and Description.
Choose a Report Type:
Dynamic: These reports automatically include all queries with the chosen labels and integrations, and will dynamically update when queries receive those tags or integrations. Queries and sections cannot be manually added or removed.
Query Based: Customize report sections and pick from any saved queries. You can add or remove queries and change report sections after creating the report.
Pick a visibility setting. Private reports are only visible to their owners. Setting a report to Public publishes it for other Veza users.
To enable the report as a dashboard, use the Collections dropdown to add the report to the "Dashboard Reports" collection.
Use the Queries tab to construct the report:
For dynamic reports, choose the labels and integrations to include in the report.
For query-based reports, click New Section to add as many sections as you need. Search for queries to add by clicking the Add Queries icon within each section.
To edit a report, open the report from the dashboard or Reports library, and click Edit Report.
You can use edit mode to:
Add or remove queries.
Add or remove or rename sections.
Change the report name or description.
Change a private report to public visibility.
Click Save to close the builder and see the changes.
To add an item to the report, change to Edit mode and click the Add Queries button. Filter or search to find the queries you want to add. Click on one or more, and Save the changes.
To remove a query from a report, click Edit Report.
Click the trash can icon in the query actions to remove that query from the report.
Deleting a query only removes it from the report. You can still add the query to other reports, and find it listed under Saved Queries.
To delete a report, open it and click the trash can icon, or use the Reports Library to manage many reports at one time.
When creating a report, users must set the visibility to public or private (default). Changing a report to public is permanent. The Reports Library shows all built-in and custom reports and privacy settings.
To modify report owners, edit a report and choose Edit Owners.
Only the report owners can view or edit private reports.
Users are the owners of any queries and report they create.
Users with the admin
role are the default owners of out-of-the-box queries and reports.
Explore discovered entities across data sources.
To navigate the Access Intelligence Overview page:
Use the Platform dropdown menu to choose an integration type. The overview will show all the discovered entities from integrations of that type (e.g., across all AWS account integrations).
Click on any entity to open a search in Query Builder, where you can review individual entities and their attributes.
You can also export the current display for stakeholders who don't have a Veza account or share a direct link:
Export: Download a PDF containing the summary of risks, entity types, and their total counts.
Share: Copy a secure link to the clipboard. Another user can open the URL and sign in to open the current filtered view.
You can review all built-in and user-created reports in the Reports Library, and organize them on the Access Intelligence > Reports overview. You can also customize on the home dashboard by adding, removing, or modifying report and queries.
Reports are collections of , organized into sections based on provider, service, risk, or other criteria. A summary of key reports appears on the primary Veza dashboard.
View results in or .
Create to get alerts when changes occur.
Veza users can create and dashboard sections tailored to specific roles, priorities, and responsibilities. Reports are public to other users or only visible to owners depending on the report's visibility settings.
Administrators can customize the insights shown on the Veza dashboard by editing, removing, or adding reports to the section. Access Risk tiles on the landing page show a summary of results from the Dashboard reports category. Each tile provides a shortcut back to the underlying report for further investigation.
The Report Library shows all reports, and their creation dates, owners, and privacy settings. To create a copy of a report, click Clone. Click a report name to view or its contents.
Click to permanently remove a query. Click Clone to create a copy of the report.
Users with the admin
and operator
can create reports that include any , grouped in custom sections. To create a report:
Click Create Report to open it in .
Adding or removing queries from a will include or exclude the results of those queries on the home page dashboard.
Use the Access Intelligence > Overview page to get quick visibility into in the Veza graph. The overview shows a summary of discovered entities, for any integration added to Veza.
The Overview page can be useful for opening entities in Query Builder to retrieve attributes such as entity ID
s when setting , developing integrations, or customizing Workflow .
Quickly inspect relationships between users, groups, and roles.
Early Access: Veza Analyze queries are currently available as an optional feature. Contact the Veza support team to learn more and to enable for your Veza tenant.
You can investigate users, groups, and role assignments from the Access Intelligence > Analyze page. This feature offers a simple interface to review a variety of authorization relationships for an individual entity.
For comparing access permissions between entities, see the Compare feature. For identifying toxic access combinations and Separation of Duties violations, see the dedicated Separation of Duties (SoD) feature.
For example, Analyze page offers a way to:
show all users that can assume a Snowflake role.
find all users or other groups that belong to an Active Directory group.
find all groups or roles that an AWS IAM user can assume or is assigned.
After running an analyze, you can review the results immediately or open the search in Query Builder to add parameters and assign rules and risk levels.
Click User Analyze, Group Analyze, or Role Analyze.
Use the Type dropdown to choose the user, group, or role by provider (such as "Salesforce User").
Select an individual entity from the second dropdown.
Pick the Analyze query to run on the chosen entity.
If results are available, they will appear in the table of records.
Click Columns to show or hide any group, role, or user properties
Click Open in Query Builder to open a search in Query Builder, with an attribute filter on the entity name.
The possible analyze options depend on whether you have chosen a user, group, role, and the entity's provider integration. The following actions are available based on the specified entity category:
User
All Groups the User is in
All Roles the User can assume
Group
All Users that are in the Group
All Roles the Group can assume
Role
All Users that can assume the Role
All Roles that can assume the Role
Use Veza to discover and manage credentials for non-human identity (NHI) accounts, including tokens, cryptographic keys, passwords, and certificates.
In Veza, an NHI secret is a piece of private data that grants access to resources, systems, and services. Non-human identities (like applications, functions, and other workloads) use secrets to authenticate and establish their permissions. Secrets typically have a fixed lifespan and are used at scale for programmatic access, with examples including:
Database connection strings and passwords
API keys for service-to-service communication
Service account credentials providing access to cloud resources
Cloud provider access keys that authorize infrastructure changes
SSH and TLS private keys for system access
Infrastructure automation tokens
Webhook signing secrets
Veza discovers and provides metadata about secrets across your cloud and application environments, enabling comprehensive visibility into security and compliance posture, including which non-human identities can access secrets, and how they are protected.
Secrets are represented in the Veza Graph as distinct entity types. When creating queries, you can select individual entity types or use top-level groupings to search for all entities of that category. For example, searching for Keys will include both AWS KMS Customer Master Keys and Azure Key Vault Keys in the results.
Application-level secrets including credentials and sensitive configuration:
AWS Secrets Manager Secrets
Azure Key Vault Secrets
HashiCorp Vault Secrets Engine Resources
Cryptographic keys used for data encryption:
AWS KMS Customer Master Keys
Azure Key Vault Keys
Google Cloud KMS Keys
Long-lived authentication tokens and certificates:
Azure Key Vault Certificates
GitHub Personal Access Tokens
How to understand and customize insights on the Veza Dashboard.
Dashboards in Veza offer visibility into your organization's authorization landscape across cloud providers, identity systems, and data stores. Combining pre-built intelligence with customizable insights, dashboards enable teams to identify risks, track access patterns, and enforce least privilege principles.
The primary Dashboards page provides a central hub for monitoring and analyzing authorization insights. Each dashboard features curated tiles to surface critical findings driven by Veza's graph search. Each tile includes options to review trends, analyze results, and create rules.
Veza provides built-in dashboards for a range of identity security use cases, including reports for dormant entities, non-human identities, privileged access by roles, and many more. The main Access Analytics Summary highlights top risks, rules, and recent alerts for your integrations. Teams can edit saved queries and reports to customize and extend these featured dashboards.
Each dashboard tile represents a single insight, supporting trend visualization, historical comparison, drill-down, and integration with Query Builder and Graph.
Risk level (low, medium, high, or critical)
Current value and trend indicator
Change over the chosen time period (percentage and total value)
Historical trend graph for the time period
Click the menu (⋮) on any tile to access quick actions:
Expand: View and export detailed trend data and analysis
Analyze: Visualize the underlying data for the saved query
Share This Tile: Copy a link to share findings with team members
Open in Query Builder: View and customize the underlying query
Open in Graph: Visualize relationships in Authorization Graph
Alert on Change: Configure notifications for changes
Create Rule: Set thresholds for critical changes and configure appropriate notification channels and Veza Actions
Schedule Export: Automate data exports and reporting
Use the left panel to access and manage dashboards, and customize their order for quick access to the most relevant insights.
Click to open built-in dashboards organized by category
Search for specific dashboards using the search bar
Add, hide, or reorder dashboards using the edit mode
Use the time range controls to analyze trends across different periods:
Past Hour
Past Day
Past 7 Days
Past 30 Days
Past 90 Days
Past 6 Months
Past Year
For 6 months and 1-year views, charts represent weekly values instead of daily values. The value shown is for the last day of a week. For example, the week of
11/19-11/25
appears on the X-axis as11/19
, and the value is the query result on11/25
.
To toggle the insights displayed, use the visibility options:
Integration Filtering: Focus on specific platforms or accounts
Risk Level Filtering: Prioritize insights by criticality
Zero Result Hiding: Remove tiles with no findings
Access dashboard-level controls in the top right:
Share: Generate shareable dashboard links
Export: Download dashboard data
Edit: Customize dashboard content and layout
Clone: Create a copy for customization
Delete: Remove dashboard
Veza offers out-of-the-box dashboards for monitoring critical access patterns, tracking changes over time, and generating and sharing insights. Built-in dashboards are available to help manage:
Identity and Privilege Access Insights
Dormant Entities
Snowflake Activity Monitoring
Salesforce Misconfigurations
GitHub Misconfigurations
Cloud IAM Insights
Snowflake Insights
Databricks Insights
Redshift Insights
BigQuery Insights
Data Insights
Top Insights
Privileged Account Dashboard
Privileged Access by Deactivated Accounts
Accounts that can Bypass MFA
Privileged Access by Accounts
Privileged Access by Roles
Privileged Access by External Accounts
Privileged Access by Machine Identities and Service Accounts
Snowflake Data Governance Dashboard
Salesforce Security Dashboard
Google Drive
SaaS Security Posture Management (SSPM)
NHI Insights
AWS IAM Insights
Google Cloud IAM Insights
Okta Insights
Active Directory and Azure AD Insights
Identity Protection Risks
NHI Access Tracker
Snowflake Role Mining Insights
AWS Role Mining Insights
Based on the data sources integrated with Veza, you can use dashboards to immediately start identifying top risks, and analyzing and acting on the most important findings.
Review and customize dashboard insights for key systems (AWS IAM, Snowflake, etc.). During this phase, work with stakeholders to:
You can then expand usage to include:
You can create reports containing both built-in and custom saved queries. You can then add these reports to your dashboard to focus on the data points most important to you. You can then share these reports with your team to provide fine-tuned visibility into the risks and trends.
Open the saved query details view or edit in Query Builder
Open the Add To Report (Optional) tab
Insights to understand and act on authorization risks and relationships that Veza has discovered.
Veza's query-driven insights enable organizations to observe, track, and remediate authorization risks using the power of the Authorization Graph. See following sections and related topics to learn more about Reports, Rules and Alerts, Risks, and Analyze.
Getting started
You can quickly get started with Veza Insights by exploring the Dashboard, and clicking Open in Reports to view the associated Queries in detail.
Repeat the process for other Saved Queries.
Opening a report shows a summary of current results, with the option to view trends, investigate entities and relationships in Graph, or open and change the original search in Query Builder.
Reports can be Veza-built or user-created, and set to private or public visibility. Owners can make customizations by opening a report and clicking Edit.
Rules can trigger when the total number of results change
Rules can also trigger when there are changes in properties for entities in the query results.
Rules can trigger an alert in the form of a service desk ticket, an email, or a custom webhook.
You can track least privilege violations, anomalies, and non-standard configurations by marking a Saved Query as a risk and setting a risk level. You can write your own queries to define potential exploits and access control risks, or use out-of-the-box saved queries.
The Analyze page provides utility search interfaces for specific tasks like reviewing Group and Role assignments. For example, you can find all users belonging to a group, all users that can assume a role, or review all group/role access for a single user.
The Compare feature allows security and identity teams to perform side-by-side comparative analysis of permissions between users or between roles. This functionality helps identify access differences, potential privilege violations, and supports access governance initiatives. See Compare for more details.
Compare offers two main functionalities:
User Comparison - Compare two users of the same type
Role Comparison - Compare two roles of the same type
Comparison is most useful after you have created baseline profiles (such as an engineering_profile
Okta User or a standardized AWS IAM Role) with the appropriate level of access. You can then compare other users or roles to the baseline to see how group and resource access varies from the established norm.
Schedule secure CSV exports of query results delivered to an email recipient.
Veza users can now schedule a periodic export (daily, weekly, etc.) of query results delivered via a secure link in email. When configured, recipients receive a secure link in email which they can download only if they have permission to view the query’s results in Veza.
When clicking a link to download a scheduled export, users are redirected to the Veza login page for Single Sign On (SSO), and the results are downloaded in CSV format. This enables Veza users to share sensitive query results data with other stakeholders while ensuring query data from Veza is protected.
Download links expire after 28 days from the export date. This is a security measure to protect customer data. Expired links cannot be reactivated. If you need to keep the links active beyond 28 days, please contact the Veza support team.
Recipients must have appropriate Veza permissions to download the data. Users must have one of these roles: Admin, Operator, or Viewer. User permissions are checked at download time, and users without sufficient permissions will be unable to download the results.
Users must have one of these Veza roles:
Admin
Operator
Viewer
For users with other roles (e.g., Reviewer
):
Assign them the Viewer
role in addition to their current role
This grants them access to view and download query results
Note: This also gives them access to other queries and dashboards
Contact Veza Support if you need more granular permissions
How scheduled exports work:
Click on “Schedule Export” on the kebab menu on a query’s details page or query builder page:
Select the CSV Via Secure Link in Email option in the next window:
Configure the schedule and recipient email address
At the scheduled intervals, recipients will receive an email containing basic usage instructions and:
A secure link to download the query results
The query name and execution timestamp
From the Query Details view (Query Actions > Schedule Export)
Choose a query on the Separation of Duties overview and choose Schedule Export from the row actions.
To configure the exports from the Save Query page:
On the Scheduled Exports tab, click CSV via Secure Link in Email
Choose a single email recipient
Choose an export time (UTC)
Choose the days of the week for the export to run
(Optional) Configure additional settings for the export:
Include all source tags in results: Add a column for Veza Tags or provider-native tags on source entities.
Include all destination tags in results: Add a column for tags on destination entities.
Show {Destination Entity} properties: Add columns for attributes on the destination entity type.
Show Summary Entities: Add a column for a summary of entities between the source and destination nodes (if specified in the original query).
Use the Queries > Exports tab page to review all queries that have been exported or are scheduled for export. The status column indicates whether the results were exported successfully. Use the actions menu to:
Edit scheduling settings
Rerun an export
Cancel an in-progress export
Using saved queries to define anomalies and highlight authorization risks.
Risk scoring in Veza helps you identify and prioritize critical authorization issues across your cloud environments, enabling security and governance teams to focus their efforts for maximum impact. By assigning risk levels to queries that detect potentially dangerous access patterns, misconfigurations, or compliance violations, you can:
Triage identity and access issues at scale
Prioritize remediation efforts based on risk severity
Add risk context to access review decisions
Track risk metrics and trends over time
Enable risk-based alerting and automation
Use the Access Intelligence > Access Risks page to get an overview of all queries with risk levels and details about each entity flagged as a risk.
Risks can have informational descriptions and remediation details that help teams understand and address security issues. Many out-of-the-box queries have these built-in, but you can add them for any risk by editing the saved query.
To view risk remediation and details:
Hover over a query to show the "expand" icon
Click the icon to open the sidebar
Review the notes on the Risk Info and Details tabs
Click Details to open the saved query details view
To add risk details and remediations:
Open the Saved Query Details
Click Edit to open in Query Builder
Click Save
On the Details tab, enter the details in the Risk Explanation and Risk Remediation sections. You can use markdown syntax to format the text.
Click Save.
Risk scores in Veza are calculated based on how many queries with risk levels an entity appears in the results of. The scoring system considers both:
The severity of risks (Critical, High, Medium, Low)
The total number of risks affecting an entity
Veza assigns a base score derived from the highest risk level an entity has, then increments the score based on additional risks:
Critical
90
+4
High
75
+3
Medium
50
+2
Low
25
+1
For example: An identity with 1 critical risk, 2 medium risks, and 1 low risk would have a score of 99:
90 (base score for critical)
+4 (1 critical risk)
+4 (2 medium risks at +2 each)
+1 (1 low risk)
Create a query in Access Intelligence > Query Builder or open an existing saved query
When saving the query, set the Risk Level to Warning or Critical
Click Save to apply the risk level
You can also set risk levels for existing queries:
Go to Access Intelligence > Saved Queries
Filter by "Risk Level: None" to find queries without a risk level
Click the Actions dropdown for a query and select Set Risk Level
After creating queries with risk levels, you can investigate results from the Access Intelligence > Access Risks overview:
Use the Risk Queries tab to:
Review all queries with risk levels
Expand a query to view entity details
Filter by label, risk level, and integration.
Sort by time, name, risk level, total risks, or percent change
View trending changes over the selected time period
Open the actions (⋮) menu on the right of each query to:
Manage Exceptions: Select entities to add or remove as exceptions
Manage Risk Level: Set a new risk level for the query
Open in Graph: Analyze entities and relationships in graph search
Open in Query Builder: View results and detailed attributes in Query Builder
Expand Risk Chart: Open the full trend chart, with the option to select a time range and save the image
Use the Risks tab to:
View all individual entities currently flagged as risks
Filter and sort by risk level
Manage exceptions for individual risks
Export risk data for reporting
Use the actions (⋮) menu on the right to:
Open the risk in graph or query builder
Mark the risk as an exception
Add an owner for the risk
Add a note.
When an entity appears in query results with a risk level, it remains flagged as a risk until either:
The entity no longer matches the query conditions
The entity is marked as an exception
To manage exceptions:
On the Risk Queries tab:
Choose a query and click Actions > Manage Exceptions
Or select individual entities and click Mark as Exception
Add an optional note explaining why the exception was made
Click Confirm to save the exception
You can also add filters to the original query to automatically exclude entities matching certain criteria.
Risk scores can provide important context during access reviews:
Create review configurations targeting high-risk entities:
Use saved queries with risk levels to scope the review
Condider higher review frequencies for high-risk access
During review, risk scores are visible to reviewers:
High scores may indicate access should be rejected
Reviewers can click risk indicators to view details
Notes can document risk-based decisions
The number of entities with risks increases beyond a threshold
New Critical or High risks are detected
Risk scores change significantly
You can configure rules to trigger:
Email notifications
Slack messages
Jira tickets
ServiceNow incidents
Custom webhooks
On-demand Access Reviews
Start with built-in queries that detect common risks like over-privileged access and misconfigurations
Create custom queries for risks specific to your environment and security policies
Use risk scores to prioritize access review scheduling and remediation efforts
Document exceptions with notes to maintain an audit trail
Monitor risk trends over time to measure security program effectiveness
Enable alerts for critical risks that require immediate attention
Detect and manage both human and non-human identities across multiple integrations.
Veza automatically applies classification logic to the identities it discovers and assigns an Identity Type, indicating if the entity represents a human user or an NHI entity.
Dashboards and out-of-the-box queries are available to help monitor and manage both human and non-human entities across cloud and enterprise systems. These queries can power a range of Veza features such as Access Reviews, Rules, and Veza Actions.
This document includes a list of supported identity types and an overview of built-in and user-defined rules for NHI classification.
These entities are assigned the “non-human” identity type:
Active Directory: Computer
Active Directory: Managed Service Account
AWS EMR: Cluster
AWS: Service Principal
AWS IAM: Identity Provider
AWS EC2: Instance
AWS Lambda: Function
AWS EKS: Cluster
Azure AD: Enterprise Application
Azure: Virtual Machine
Azure AKS: Managed Cluster
Databricks: Service Principal
Databricks: Account Service Principal
Dynamics 365: Application User
Google Cloud: Service Account
Google Cloud Compute: Virtual Machine
Google Cloud Run: Service Instance
Google Kubernetes Engine: Cluster
GitHub: Deploy Key
GitHub: App
Kubernetes: Service Account
These entities have the “human” identity type by default:
AWS SSO: User
Azure AD: User
Azure: Classic Administrator
Bitbucket: User
Box: User
Custom HRIS (Open Authorization API): Employee
Databricks: User
Databricks: Account User
Google Workspace: User
GitHub: Personal Account
Kubernetes: User
MongoDB Atlas: User
OneLogin: User
Oracle Cloud IAM: User
Oracle DB: User
PingOne: User
SAP ECC: User
SharePoint: User
SQL Server: Login
Veza: User
Workday: Worker
The following entities can be marked “human” or “non-human” depending on Veza rules for identifying NHIs:
Active Directory: User (Built-in Rule)
AWS Redshift: User
AWS RDS Postgres: User
AWS RDS MySQL: User
AWS RDS MySQL: User Instance
AWS: IAM User (Built-in Rule)
Open Authorization API: Custom User
Open Authorization API: Custom IDP User
Open Authorization API: Custom Principal User
Microsoft Dynamics 365: User (Built-in Rule)
AWS ElasticSearch: User
Google Cloud SQL: User (Built-in Rule)
Hashicorp Vault: Alias (Built-in Rule)
Hashicorp Vault: Entity (Built-in Rule)
Mongo DB User
Mongo DB Atlas Database User
Okta User (Built-in Rule)
PostgreSQL User
Salesforce User
ServiceNow User (Built-in Rule)
Snowflake User (Built-in Rule)
SQL Server Database User
Trino User
Workday Account (Built-in Rule)
Veza has internal rules to assign some of these identity types as non-human. See the following section for rule details.
For some integrations, there is no consistent method to automatically detect non-human identities. In Veza, these are shown as “human” by default. This behavior can be changed to label certain identities based on tags, naming patterns, groups, or other conventions employed by your organization.
Veza uses the following rules to distinguish between human and non-human accounts in supported integrations:
Integration Type
Non-Human Identity (NHI) Rule
AWS IAM User
Considered non-human if ConsoleAccess is nil/false and MfaActive is false.
Active Directory User
Non-human if User Principal Name (UPN) is absent.
Dynamics 365 User
Non-human if the user is marked as non-interactive.
Google Cloud SQL User
Identified as non-human if UserType is UserTypeCloudIAMServiceAccount, UserTypeCloudIAMGroup, or UserTypeCloudIAMGroupServiceAccount.
HashiCorp Vault Alias
Identified as non-human if the Alias’s UserType is “service account.”
HashiCorp Vault Entity
Identified as non-human if the Entity’s UserType is “service account.”
ServiceNow User
Non-human if flagged as an internal integration user or if the email is missing.
Okta User
Non-human if all conditions are met: UserType, Manager, and DisplayName are empty; MFA is false; LastLogin is nil.
Snowflake User
Non-human if any of the following conditions are met:
User is configured to use RSA public key authentication without a password.
User is a SNOWFLAKE user (a special user that is only used by Snowflake Support).
User is a WORKSHEETS_APP_USER user (the first time Snowsight is accessed in an account, Snowflake creates this internal account to support the web interface).
User's Type
is one of the following Snowflake non-human account types: SERVICE
, LEGACY_SERVICE
, or SNOWFLAKE_SERVICE
.
Workday Account
Non-human if UI sessions are not allowed; otherwise, assumed human.
Veza provides Non-Human Identity (NHI) Enrichment Rules to automate NHI labeling based on specific conditions. For example, you might assign users as non-human when their email contains “service-account-%”, “svc-%”, or is missing.
Administrators can add rules on the Integrations > Enrichment page:
Save a Query: In Query Builder, save a query that identifies the entities to mark as non-human. For example, you could query for SAP ECC Users where the Email or Name contains the text “system-”.
Enable Enrichment Rules: Configure the saved query as an enrichment rule. When extracting metadata, Veza will update the Identity Type attribute for any entities that match the query conditions.
Conditional notifications for risk and anomaly detection
Veza's rules engine enables active monitoring of authorization changes within your environment. Rules and Alerts offer ways to establish security baselines based on any custom or built-in assessment query, and trigger notifications and Veza Actions when changes occur. For example, you might use Veza rules to:
Identity new or removed accounts with superuser permissions on sensitive resources
Get notifications for storage buckets with incorrect configurations
Watch for changes to roles, IAM policies, or any other entity Veza has discovered.
When a rule is configured for a saved query, actions will trigger when the query results meet the conditions established by the rule. The baseline query, thresholds, and notification settings for these alert events are set when creating the rule. You can create your own queries to define the rule scope, or choose from built-in assessment queries. Alert notifications can use a webhook, email, or an external integration.
Possible rule and query combinations include:
When your environment includes one or more Azure AD groups with no users
When a new AWS IAM policy granting access to *
resources is detected
When the number of federated Okta users with AWS DynamoDB access changes
When there are fewer than 2 principles with permissions for critical administrative tasks (in case one becomes unavailable)
Use the actions dropdown menu to create or edit rules for any assessment in a report. You can create and manage rules when saving a query.
Alert firing logic: Veza's alert system prevents excessive notifications. Once an alert is triggered by a specific condition—such as the result count exceeding 5—it will not re-trigger for the same condition until the metric falls back to or below 5 and then rises above it again.
To create a rule for a saved query, go to Access Search > Saved Queries. You can also create rule directly from the Query Builder or any dashboard.
To add a rule for a saved query:
On the Saved Queries page, filter or search to find a built-in or user-created query. Click Manage Rules from the actions menu to edit rules for the query.
Click Add a new rule to open the rule builder:
Give the rule a name and description, and set the severity level.
You can configure escalating levels of rules to trigger different actions based on the severity level: High
, Medium
, or Low
.
Configure rule conditions:
Choose to trigger the rule based on the number of Query Results, or changes in Query Properties:
Query Results: Choose an operator (equals, less than, more than, changed by, changed by more than, increased by more than) and count to trigger the rule.
Query Properties: Choose an attribute that will trigger the rule if it changes.
Configure rule actions (optional):
Check the box to deliver the alert via the selected Veza Action: email, webhook, ServiceNow, or Jira. The alert will include details about the query result that triggered the rule for remediation purposes.
If you have not configured a supported Veza Action, click Create Veza Action to open the builder in a new tab. To enable Webhooks and other destinations, see Veza Actions.
Click Save to close the rule builder.
On the Save Query flow, add additional rules as desired.
Click Save Query to save your changes.
Once saved and enabled, the rule will appear active on the Rules tab of the Access Intelligence > Rules & Alerts page.
The query and results that triggered the rule
The previous query results
The entities that changed between the two updates
Supported targets for alerts are:
Veza notifications are always enabled for active rules. A notification icon with the number of any new alerts is shown on the Veza navigation menu, with more details available on the Access Intelligence > Rules and Alerts page. The list can be sorted by date or severity.
Each row on the Rules tab represents a Query with a rule attached, with the option to view query details, edit the rule, or delete the rule.
The Alert Details tab shows individual alert events for each time the rule has been triggered, including the trigger condition and description.
Compare users and roles to identify access and attribute similarities, differences, and potential security risks in your organization.
The Access Intelligence > Compare feature enables side-by-side analysis of access and attributes between users or roles.
Often, environments will contain identical or very similar users, roles and other entities (such as dozens of AWS accounts with identically named roles like admin_terraform
). When one of these is well-maintained, you can compare it with others and make adjustments to align with all the ideal example. Compare makes this easier.
In addition, comparison can help security teams identify access and attribute differences to support access governance initiatives in the following ways:
Identify excessive access by comparing users/roles with ideal user/role
Identify missing access by comparison
Identify key identifying attributes that helps one differentiate between two users/roles clearly
Identify incorrect attributes for users/roles by comparing with others
Compare supports two entity types for comparison, and different ways to examine entities:
Users - Compare two users of the same type
Roles - Compare two roles of the same type
Properties - Compare attributes and metadata such as creation dates, IDs, and configuration settings
Relationships - Compare access relationships, such as which resources an identity can access
Comparison is most useful after you have created baseline profiles (such as an engineering_profile
Okta User or AWS IAM Role) with the appropriate level of access. You can then compare other users or roles to the baseline to see how properties and access vary from the established norm.
To effectively leverage the Compare feature in your security program, organizations should:
Establish standardized baseline profiles for each job function and role type
Conduct regular, scheduled audits comparing production users and roles against baselines
Document intentional deviations when discovered and approved
User comparison provides insights for teams managing user access across systems. You can use it to verify the effectiveness of role-based access control by comparing users with similar roles:
Validate onboarding by comparing new users against established templates
Detect privilege creep where users have accumulated excessive permissions
Support offboarding processes by comparing departing employees with their replacements
Role comparison can enable standardization for similar roles, and reduce security gaps and confusion in environments with many roles:
Identify and consolidate redundant roles for reduced complexity
Identify drift when similar roles have gained or lost permissions over time
Validate role designs by confirming roles have the appropriate access for their intended function (neither too permissive nor too restrictive)
Focus specifically on role differences rather than reviewing all permissions from scratch
From the main Veza navigation, go to the Access Intelligence > Compare section
Select either the User Comparison or Role Comparison tab
Configure the comparison:
Select the Type (e.g., AWS IAM Role, Okta User, Azure AD User)
Select Entity 1 (typically your baseline entity)
Select Entity 2 (the entity you want to compare)
Choose the Type of Comparison
Property - Compare the properties of the two entities (such as creation date, ID fields, etc.)
Relationship - Compare the relationships between entities (such as access to resources)
For Relationship comparison, use the Relates To filter to choose a related entity type (e.g., S3 Bucket).
Click Run to generate the comparison
The result output changes based on the comparison type:
Property comparison shows differences in the attributes of two users or roles. The table of results includes information about:
Access Matching - Whether the property values match between the two entities
"Complete Match" - The property value is identical for both entities
"No Match" - The property values differ between entities
Both Have Property - Shows values common to both entities
User/Role 1 Only - Shows values specific to the first entity
User/Role 2 Only - Shows values unique to the second entity
Relationship comparison shows the access relationships between entities. When comparing roles, you can see the resources to which each role has an access-granting relationship. When comparing users, you can review the resources that two users can access.
For relationship comparison, the results display:
Visual indicators (checkmarks and X marks) showing which entities have access
Matching status (Complete Match, No Match), indicating whether access is the same or different
Filtering options to focus on specific resources or access patterns
Entities are the diverse authorization, identity, and data objects discovered by Veza, forming the Veza authorization graph.
Queries typically specify source and destination entity types, such as Okta Users related to AWS S3 Buckets
or Google Users related to Google Groups
, returning all entities with that relationship. Higher-level Entity Type Groupings, such as All Users
or All Resources
, enable search across multiple entity types simultaneously, or within specific types within a group. For example, the User
entity type grouping includes all entities that Veza categorizes as a user, such as Okta Users, Snowflake Local Users, and AWS IAM Users.
Entity metadata attributes are the rich properties associated with each node in the graph. You can use filters to refine search results based on these attributes, which can potentially include custom properties if the integration supports them. Some attributes may be added by Veza during parsing (such as risk_score
, identity_type
, or full_admin
), while most are ingested directly from the integration data source (such as mfa_enabled
for users or is_encrypted
for S3 Buckets).
A dashboard tile is based on a , and indicates the:
Click a tile to open the view. You can use the query details view to manage exceptions or create rules, visualize trends over time, and access the original query description and parameters.
Focus on establishing your core access graph with 3-5 critical . This initial phase can deliver immediate value by providing visibility into key systems while additional integrations are added to Veza.
Set appropriate
Configure
for specific use cases
User/group/role comparison and
Advanced access pattern detection with and
Custom and dashboards
implementation (if applicable)
To add queries to reports when :
Administrators can customize the available dashboards by adding and removing reports from the .
Identify a you want to track.
Add that query to a new
Add the Report to the .
Give the query a to flag entities in the results.
Create a to get notifications when the query results meet the specified conditions.
A is a collection of , organized to best meet the needs of a specific organization, team, or user.
Adding reports to section allows users to customize summaries that appear on the primary Veza Home page for easy access and continuous monitoring. Dashboard tiles show the trending change for the last week or month, and the most recent query results. You can edit these reports and queries to focus on the most important findings.
You can define and monitor security baselines using for . A rule consists of a baseline query, thresholds of conditions, and notification settings. Alerts trigger when the Rule's conditions are met.
The results of these queries are highlighted in Graph search when Show Risks is enabled. Active risks be reviewed on the page. For results that can't be acted on or are safe to ignore, you can individually mark the entities as exceptions, or add filters to the original query.
For more advanced Segregation of Duty (SoD) capabilities, Veza offers a that enables comprehensive identification and management of toxic access combinations across your organization.
For more information about Veza teams and roles, see . For technical support or to request modifications to the link expiration period, please contact your Veza support representative.
You can enable scheduled exports when . To schedule exports for a saved query:
Click on a tile to open the query details, or find the query on the Access Visibility > Queries page.
Create to get notifications when:
Enrichment Rules will take precedence over any default identity type for specific users. To learn more, see the documentation.
To highlight these entities in Search and show risk levels, mark the query as a (in addition to, or instead of, creating an alert rule).
To deliver the notification via a webhook, email, or Slack, you will first need to create the connection from Integrations > . When the rule triggers, a JSON payload will be delivered to the destination address, including:
Entities represent the authorization, data, and identity objects discovered by Veza, that appear as Query Builder results and as related nodes in Graph search. Entities can be data services or resources, identity domains, users or groups, and IAM or RBAC elements such as policies and roles. You can use the page to review all the entities from all connected integrations and open them in Query Builder to view details.
Configuring an identity, cloud, or other data provider enables Veza to gather a range of authorization metadata. This metadata includes relationships between federated identities, application users, service accounts, and groups and roles. Entities can also represent services and data resources, and permissions on these resources. These entities constitute the Veza authorization graph, which can be queried to identify , define , conduct , and enable automated Lifecycle Management workflows.