Identity Outliers, part of SailPoint Access Insights, enables IdentityNow administrators to quickly discover and remediate risky access in an organization. SailPoint discovers identities with access that is significantly different than their peers. By gathering and presenting these identity outliers in one place, admins can quickly examine and address risky access privileges in their organization.
- IdentityNow users must have Access Insights to access Identity Outliers.
- IdentityNow users must have Certifications to launch certification campaigns from Identity Outliers.
- Your organization must have configured a source and loaded account data.
- Your organization’s account data must be onboarded into AI-Driven Identity Security.
- Launch the Identity Outlier Dashboard to discover outliers.
- Review the discovered outliers.
- Remediate some or all outliers.
Each process overview step is described in detail in the sections that follow.
In IdentityNow, navigate to Admin > Identities > Outliers to display the Identity Outlier Dashboard. The dashboard presents high-level, summary information about outliers in your organization and recommended actions for remediation. SailPoint looks for new outliers regularly.
The dashboard can be accessed by Admins or users with the report admin user level.
The Total Outliers card displays the following information:
- The total number of identities that have low-similarity access compared to others in the organization.
- Trends over the last 30 days, such as how many more or fewer outliers have been discovered, or whether the number of outliers has stayed the same.
If your organization has Certifications, the Recommended Actions section of the dashboard provides a quick remediation action to certify all outliers.
Before you decide what to do about the identity outliers in your organization, you might want to review who they are, their attributes, and why they are an outlier.
To review a list of all discovered identity outliers, select the Total Outliers card.
You can review outlier information for all outliers in the Identity Outliers list or explore contextual insights for each individual outlier identity.
Working with the Identity Outliers List
The Identity Outliers list displays the following information for each outlier:
An outlier score ranging from 0-100 that indicates the potential riskiness of an identity based on their individual security factors.
The date they were discovered to be an outlier
Identity attributes such as job title, department, or location. The identity attributes displayed can be changed with help from SailPoint Services.
You can work with the list of outliers as follows:
On the Identity Outliers page, review the list of outliers by scrolling or searching for an identity name.
Select the Sort and Filter icon to sort the outliers list and filter by certification status, outlier date range, or identity attributes.
The Outlier Certification Status checkboxes pertain only to active certifications. Staged/scheduled certifications are not considered to be active.
To see the access history for an outlier, select the More Options icon , then View Access History. You will be redirected to the Access History page for the identity.
To ignore an identity outlier, select Options > Ignore. The identity will not be discovered as an outlier again unless there is a significant change in their entitlements.
If the ignored identity's entitlements change significantly, the identity will be redetected as an outlier and will reappear in the Identity Outliers list.
To unignore a previously ignored outlier, select the More Options icon , then Unignore.
To export outlier data to a .csv file, select Export.
Viewing Outlier Score Contextual Insights
On the Identity Outliers page, select an outlier from the list to see the contextual insights for the outlier score.
Several outlier score factors contribute to an identity’s outlier score.
The factors displayed depend on the data available for the outlier identity. So the factors displayed might be different from one identity to another. Any of the following factors may be displayed:
Peer Access Similarity - A percentage showing how similar the outlier's access is to the access of their closest peer.
Standalone Entitlements - The number of the outlier's entitlements that are not bundled in an access profiles or role. Higher counts are potentially riskier.
Rare Access - The percentage of the outlier’s entitlements that are held by less than 1% of all identities in the organization. Higher percentages represent greater risk.
Roles with a Single Entitlement - The number of the outlier's roles that contain only 1 entitlement. Higher numbers suggest closer attention to the role definitions may be warranted.
Entitlement Count - The outlier’s total number of entitlements. This warrants attention when the number is much higher or much lower than the average count across your identities.
Role Uniqueness - The uniqueness of the identity's roles compared to other roles in the organization.
You can remediate your organization’s identity outliers by starting a certification campaign to have their access reviewed and approved. Certifications help organizations reduce the risk of inappropriate access, satisfy audit requirements, and meet regulatory standards.
Certification is limited to 1,000 identity outliers per campaign.
You can create outlier certification campaigns from the Identity Outlier Dashboard or from the Identity Outliers page:
On the Identity Outlier Dashboard, select Create Certification to start a certification campaign for all discovered outliers.
On the Identity Outliers page:
Select Create Certification for a single outlier.
Select checkboxes for multiple outliers, and then select any Create Certification button to certify several outliers in one campaign.
Identity Outliers will automatically pre-fill a new certification campaign with the identities and entitlements. You can review them and input an appropriate certification name and campaign details to confirm the campaign.
We recommend you include the text "Identity Outliers" in the certification name or description to capture the source of the campaign.