Data, Security & Legal

How are access and activities authorized and logged?

12/29/2025

Access management in Dark Radar is designed in accordance with enterprise security standards. Authorization is handled through a Role-Based Access Control (RBAC) model. Each user is assigned permissions based on their role and use case, and cannot access data, panels, or functions outside of their assigned scope.


Authentication integrates with enterprise identity providers such as Microsoft Active Directory, Okta, and Auth0. This allows centralized identity management and real-time reflection of permission changes across the platform.


All access and actions are comprehensively logged. User logins, queries, viewed data fields, configuration changes, and automated system actions are recorded. Logs are stored in an immutable, tamper-resistant format to ensure full auditability.


Logs are not only used for post-incident investigation but are also actively analyzed for anomaly detection and early identification of security incidents. Unusual access patterns or unauthorized attempts automatically trigger alerts for further review and response.

Was this article helpful?