Skip to main content

Roles & Permissions

Control user access and capabilities with role-based access control (RBAC).

Role-Based Access Control

CastellanAI uses role-based access control (RBAC) to manage user permissions. Each user is assigned one or more roles that determine what they can view and do within the platform.

PrincipleDescription
Principle of Least PrivilegeUsers only get access they need
Separation of DutiesCritical actions require multiple roles
Audit TrailAll actions logged with role context
Custom RolesCreate roles tailored to your needs

Built-in Roles

CastellanAI includes four pre-configured roles for common use cases:

Administrator

Full system access with no restrictions. Can manage all users, settings, and configurations.

Capabilities:

  • View and manage all security events
  • Execute response actions without approval
  • Create and modify detection rules
  • Manage users, roles, and permissions
  • Configure system settings and integrations
  • Access billing and subscription management
Security Note

Limit administrator role to 2-3 trusted individuals. All administrator actions are logged.

Security Analyst

Primary role for security operations personnel. Can investigate and triage threats but requires approval for high-impact actions.

Capabilities:

  • View all security events
  • Investigate incidents
  • Triage and assign threats
  • Create custom rules
  • Add IOCs to watchlists
  • Generate reports
  • Suggest actions (requires approval)

Limitations:

  • Cannot modify system settings

Incident Responder

Tactical role focused on threat containment and remediation. Can execute response actions with limited approval requirements.

Capabilities:

  • View assigned incidents
  • Execute response actions
  • Block IPs and quarantine files
  • Isolate compromised hosts

Limitations:

  • Limited event visibility (assigned only)
  • Cannot create detection rules

Viewer

Read-only access for compliance officers, auditors, and stakeholders who need visibility without operational control.

Capabilities:

  • View security dashboard
  • View security events (read-only)
  • View reports and metrics
  • Export data (non-sensitive)

Limitations:

  • Cannot modify anything
  • Cannot execute actions

Permission Matrix

Quick reference for role capabilities:

PermissionAdminAnalystResponderViewer
View Security EventsYesYesAssigned OnlyYes
Create Detection RulesYesYesNoNo
Execute Response ActionsYesWith ApprovalYesNo
Manage Users & RolesYesNoNoNo
Configure System SettingsYesNoNoNo
Generate ReportsYesYesYesYes
Access BillingYesNoNoNo

Managing User Roles

Assigning Roles

  1. Navigate to Settings -> User Management
  2. Select the user you want to modify
  3. Click Edit Roles
  4. Check/uncheck roles as needed (users can have multiple roles)
  5. Click Save Changes

Changes take effect immediately. Users will be notified of role changes via email.

Creating Custom Roles

Enterprise plan customers can create custom roles with granular permissions:

  1. Go to Settings -> Roles & Permissions
  2. Click Create Custom Role
  3. Name the role and provide a description
  4. Select specific permissions from the permission list
  5. Test the role with a test user before deploying

Best Practices

  • Regular Access Reviews - Audit user roles quarterly to ensure appropriate access levels
  • Minimize Administrator Accounts - Limit administrator role to 2-3 trusted individuals maximum
  • Require MFA for Privileged Roles - Enforce multi-factor authentication for Administrator and Analyst roles
  • Document Role Assignments - Maintain records of why users have specific roles for compliance
  • Immediate Revocation - Remove access immediately when employees leave or change roles

What's Next?

Need Help?

Our team can assist with designing role structures for your organization.

Contact Support