Identity Compliance

Strengthen your security posture by enforcing least privilege, comply with regulatory requirements.

laptop and magnifying glass

Centralized visibility and stronger control

Simplify your compliance initiatives while mitigating the risk of unauthorized, accumulated and overprivileged access.

Simplify Provisioning Icon

Understand who has access to what

Discover user access and authorizations to various resources, including access to highly privileged accounts.

Security Badge icon

Continuously review access and enforce least privilege

Make informed decisions to continuously enforce least privilege and ensure users only have the access they need to do their jobs.

Comprehensive Reporting

Demonstrate compliance

Leverage intelligent analytics to proactively detect risks and make critical remediation decisions to stay in compliance with the most stringent regulations.

By 2023, 75% of security failures will result from inadequate management of identities, access, and privileges—up 50% from 2020.*
-Gartner®

Keep auditors happy, keep attackers out

Identity Compliance Provides a Single Control Pane for Access and Compliance Management for All User Accounts and Privileges.

Access Discovery

Discover all the resources and entitlements granted to users within the organization including access to SaaS applications, and access to privileged accounts stored in CyberArk Privileged Vault.

Access Discovery

Access Certification

Periodically review, approve or revoke access privileges to applications and permissions to various safes within the CyberArk Privileged Vault. Leverage contextual information for these decisions with rich insights on access history and risk scores.

Access Certification

Analytics and Reporting

Access advanced analytics and dashboards to intelligently identify potential compliance issues, view detailed audit trails and create custom reports.

Compliance Analytics

Access Automation

Integrate with CyberArk Identity Lifecycle Management to boost productivity by removing manual tasks, simplifying self-service access workflows, and automating onboarding and offboarding processes.

Compliance Integration

Advanced Workflows

Leverage CyberArk Identity Flows to orchestrate and automate the complex business processes involved in demonstrating regulatory compliance with no code workflows.

Advanced Workflows

Continuously discover, certify, remediate and audit access

Extend the zero trust model across your enterprise by leveraging Identity Compliance for user access.

identity compliance diagram infographic

Plans

CyberArk Identity Compliance

Standard

Identity Compliance

Access Discovery (includes discovery of safes from self hosted PAM and Privilege Cloud)

Access Certifications(includes certification of safes in self hosted PAM and Privilege Cloud)

Reporting

SIEM Integration

Access Management

Role-based access policy

B2B federation

Basic web multi-factor authentication (MFA)

MFA using OATH tokens and security questions

MFA using a third-party RADIUS server

Directory services

Cloud Directory

Custom Domain URLs (e.g. www.company.com/login)

Integrations to AD, LDAP, and Google Cloud Directory

Custom user attributes

Directory APIs

SCIM server

Show features

CyberArk Identity Compliance

STANDARD

$5 Monthly/User

Identity Compliance

Access Discovery (includes discovery of safes from self hosted PAM and Privilege Cloud)

Access Certifications(includes certification of safes in self hosted PAM and Privilege Cloud)

Reporting

SIEM Integration

Access Management

Role-based access policy

B2B federation

Basic web multi-factor authentication (MFA)

MFA using OATH tokens and security questions

MFA using a third-party RADIUS server

Directory services

Cloud Directory

Custom Domain URLs (e.g. www.company.com/login)

Integrations to AD, LDAP, and Google Cloud Directory

Custom user attributes

Directory APIs

SCIM server

Show features

Explore
related
resources

*GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

*Gartner, “Managing Privileged Access in Cloud Infrastructure”, June 9, 2020.