Skip to main content

Roles & Permissions

Control user access and capabilities with role-based access control (RBAC).

Principle of Least Privilege

Users should only have access to what they need. CastellanAI's RBAC ensures secure, auditable access management.


Role-Based Access Control

PrincipleDescription
Principle of Least PrivilegeUsers only get access they need
Separation of DutiesCritical actions require multiple roles
Audit TrailAll actions logged with role context
Custom RolesCreate roles tailored to your needs

Built-in Roles

Administrator

Full system access with no restrictions. Can manage all users, settings, and configurations.

Capabilities:

CapabilityDescription
View and manage all security eventsFull event access
Execute response actionsNo approval required
Create and modify detection rulesFull rule management
Manage users, roles, and permissionsComplete user control
Configure system settingsFull configuration access
Access billing and subscriptionFinancial management
Security Note

Limit administrator role to 2-3 trusted individuals. All administrator actions are logged.


Permission Matrix

Quick reference for role capabilities:

PermissionAdminAnalystResponderViewer
View Security EventsAssigned
Create Detection Rules
Execute Response ActionsApproval
Manage Users & Roles
Configure System Settings
Generate Reports
Access Billing

Managing User Roles

Assigning Roles

  1. Navigate to Settings → User Management
  2. Select the user you want to modify
  3. Click Edit Roles
  4. Check/uncheck roles as needed (users can have multiple roles)
  5. Click Save Changes
Immediate Effect

Changes take effect immediately. Users will be notified of role changes via email.


Best Practices

Role Management Do's

PracticeDescription
Regular Access ReviewsAudit user roles quarterly
Minimize Admin AccountsLimit to 2-3 trusted individuals
Require MFAEnforce for Administrator and Analyst roles
Document AssignmentsRecord why users have specific roles
Immediate RevocationRemove access when employees leave
📝 Role Assignment Checklist
  • Identify user's job function and responsibilities
  • Select minimum required role
  • Document role assignment rationale
  • Configure MFA if required for role
  • Notify user of assigned permissions
  • Schedule quarterly review date

What's Next?

GuideDescription
Multi-Factor AuthenticationEnhance account security
User Activity MonitoringTrack user actions
Access Control PoliciesConfigure advanced access controls
Need Help?

Our team can assist with designing role structures for your organization. Contact Support