Current route truth
Preview-grade technical outputThe public route exists now and reflects the current technical-report pattern; delivery remains preview-grade and anchored to synthetic MRI findings.
This public MRI demo mirrors the technical report structure currently used for MRI assessment output. In the authenticated portal today, report delivery is still anchored around assessment runs and downloads.
Technical framing: synthetic findings and remediation narratives are shown here as public demo output, not as a claim that every path is already substrate-evidenced in the live portal.
Demo truth model
Persona switching, posture, blast radius, and remediation delta are anchored to real platform/runtime contracts.
Detailed technical findings, attack-path evidence, policy violations, and remediation ownership for engineering and identity operations teams.
These findings are rendered from the MRI demo report pack. The structure is real, but this public report should not imply that every finding row, owner, and due date shown here is already coming from live tenant-backed workflow state.
| High | SAML Role With AdministratorAccess and No Condition Keys |
| Medium | 23 IAM Access Keys Not Rotated (>90 days) |
| Medium | Cross-Account Trust From Shared-Services Account Lacks Condition Keys |
| Medium | S3 Bucket acme.bucket.customer-data Has Overly Permissive Bucket Policy |
| Low | CloudTrail Not Enabled in 2 Subsidiary Accounts |
| High | svc-entra-sync Has Domain Admins Membership; Password Age 289 Days |
| High | 3 Accounts With adminCount=1 Outside Protected Groups (AdminSDHolder) |
| Medium | 47 Stale Computer Accounts With Active SPNs and Delegation Attributes |
| Medium | Fine-Grained Password Policy Not Applied to 86 Service Accounts |
| High | BeyondTrust Admin Credential Unchanged 380 Days; Used by 3 Named Administrators |
| Medium | Jump Clients Not Segregated by Network Zone; Production and Dev in Same Jump Group |
| Medium | 12 BeyondTrust Team Passwords Not Certified in 12 Months; 4 Reference Decommissioned Systems |
| High | 23 Privileged Accounts With No Dual-Control Enforcement on Password Retrieval |
| High | Shared "VaultAdmin" Account — No Individual Accountability for CyberArk Admin Operations |
| Medium | 34 Accounts With Automatic Password Rotation Disabled; 12 Passwords Older Than 180 Days |
| Medium | Privileged Session Manager Not Mandatory for 4 High-Privilege Safe Groups |
| High | 6 Permanent Global Administrator Assignments Without PIM |
| Medium | CA-FederatedSessions: No Step-Up for Okta Token |
| Medium | 156 Users Without Phishing-Resistant MFA Registration |
| Medium | Service Principal Secret Expiry: 23 Secrets > 180 Days Old |
| Low | 34 Inactive Guest Accounts (>90 days) |
| High | OIDC Not Configured; 47 Deployment Workflows Use Long-Lived Cloud Credentials |
| High | 4 GitHub Organisation Owners Use Personal Accounts — Bypass Enterprise SSO |
| Medium | GitHub Actions Permissions Allow All Actions From Any Publisher |
| Medium | 34 Repository Deploy Keys Older Than 180 Days; 8 With Write Access |
| High | 6 Service Account Keys Unrotated (>90 days); 3 Exposed in CI/CD |
| Medium | Project-Level IAM Bindings for 4 Service Accounts Exceed Intended Scope |
| Medium | BigQuery Finance Dataset Lacks Row-Level Security |
| Medium | Org Policy Constraint iam.disableServiceAccountKeyCreation Not Enforced |
| Low | GCP Audit Logs Not Exported to SIEM for 3 Projects |
| High | 4 cluster-admin ClusterRoleBindings to Workload Service Accounts |
| Medium | Pod Security Standards Not Enforced in 5 Namespaces |
| Medium | IRSA Role acme.role.k8s-data-access Has Broad S3 and DynamoDB Permissions |
| Medium | Secrets Not Encrypted at Rest (etcd); Using Kubernetes Secrets Without KMS |
| Low | Container Images Not Scanned Before Deployment in 3 Pipelines |
| High | Super Admin Accounts Accessible from Named Network Zone Without FIDO2 |
| Medium | Inactive SAML Applications — 6 Apps With No Sign-In in >90 Days |
| Medium | 12 API Tokens Older Than 90 Days |
| Medium | Okta Inline Hook Not Validated — Authentication Policy Bypass |
| Low | Admin Role Assignments Lack Access Certification Review |
| High | 4 Slack Workspace Admins Using Email/Password Auth Without Okta SSO Enforcement |
| High | Salesforce System Admin Profile: 9 Users, 3 Without Step-Up MFA |
| Medium | 23 Slack Guest Users With Sensitive Channel Access Inactive >90 Days |
| Medium | Workday ISU Integration Credential Not Rotated in 18 Months |
| Low | 6 Inactive SAML Apps With No Sign-Ins in 90 Days Still Active in Okta |
| High | IT Annual Access Review: 89 Open Items Past SLA; 34 Auto-Approved |
| High | SailPoint Connector Accounts Over-Privileged on Target Systems |
| Medium | Emergency Access Provisioning Bypasses Approval for 23 High-Risk Entitlements |
| Medium | 67 SailPoint Role Assignments Not Reviewed in 12 Months; 12 Over-Privileged |
| Low | SailPoint Audit Log Retention: 30 Days (Compliance Requirement: 12 Months) |
Joiners Pending Review
14
Movers Pending Review
31
Leavers Still Active
11
Ghost Accounts
23
Hidden privilege, concentration, and standing access are real MRI themes. In this report they are represented through the demo dataset, but the underlying product pattern is anchored to the privilege inference and posture engine design.
Tier-0 Identities
11
Tier-1 Identities
63
Without JIT
18
Stale Privileged
21
74 total privileged identities across all tiers. Tier-0 accounts hold Domain Admin / Global Admin equivalents.
MITRE mapping and threat-language framing are illustrative on this public route. Treat them as representative detection storytelling rather than a claim that every mapped technique here is already verified from live attack telemetry.
Policy and evidence structure mirrors the live product model. Evidence bundle links and captured artifacts in this public report remain illustrative unless the underlying tenant data source is live and explicitly evidenced.
No policy violations in this scenario.
Remediation prioritisation is a real product pattern. On this demo route the playbooks, dates, and ownership are curated so the story stays stable, but the intended live experience is to ground these deltas in blast-radius and simulation-backed consequence changes.
| Severity | Finding | Due Date |
|---|---|---|
| High | 6 Permanent Global Administrator Assignments Without PIMOverdue | 20 Mar 2026 |
| High | SAML Role With AdministratorAccess and No Condition KeysOverdue | 20 Mar 2026 |
| High | Super Admin Accounts Accessible from Named Network Zone Without FIDO2Overdue | 20 Mar 2026 |
| High | 6 Service Account Keys Unrotated (>90 days); 3 Exposed in CI/CDOverdue | 20 Mar 2026 |
| High | 4 cluster-admin ClusterRoleBindings to Workload Service AccountsOverdue | 20 Mar 2026 |
| High | svc-entra-sync Has Domain Admins Membership; Password Age 289 DaysOverdue | 20 Mar 2026 |
| High | 4 Slack Workspace Admins Using Email/Password Auth Without Okta SSO EnforcementOverdue | 20 Mar 2026 |
| High | IT Annual Access Review: 89 Open Items Past SLA; 34 Auto-ApprovedOverdue | 20 Mar 2026 |
| High | 23 Privileged Accounts With No Dual-Control Enforcement on Password RetrievalOverdue | 20 Mar 2026 |
| High | BeyondTrust Admin Credential Unchanged 380 Days; Used by 3 Named AdministratorsOverdue | 20 Mar 2026 |
| High | OIDC Not Configured; 47 Deployment Workflows Use Long-Lived Cloud CredentialsOverdue | 20 Mar 2026 |
| High | 3 Accounts With adminCount=1 Outside Protected Groups (AdminSDHolder)Overdue | 21 Mar 2026 |
| High | Salesforce System Admin Profile: 9 Users, 3 Without Step-Up MFAOverdue | 21 Mar 2026 |
| High | SailPoint Connector Accounts Over-Privileged on Target SystemsOverdue | 21 Mar 2026 |
| High | Shared "VaultAdmin" Account — No Individual Accountability for CyberArk Admin OperationsOverdue | 21 Mar 2026 |
| High | 4 GitHub Organisation Owners Use Personal Accounts — Bypass Enterprise SSOOverdue | 21 Mar 2026 |
| Medium | Service Principal Secret Expiry: 23 Secrets > 180 Days OldOverdue | 28 Mar 2026 |
| Medium | S3 Bucket acme.bucket.customer-data Has Overly Permissive Bucket PolicyOverdue | 28 Mar 2026 |
| Medium | Okta Inline Hook Not Validated — Authentication Policy BypassOverdue | 28 Mar 2026 |
| Medium | Org Policy Constraint iam.disableServiceAccountKeyCreation Not EnforcedOverdue | 28 Mar 2026 |
| Medium | Secrets Not Encrypted at Rest (etcd); Using Kubernetes Secrets Without KMSOverdue | 28 Mar 2026 |
| Medium | Fine-Grained Password Policy Not Applied to 86 Service AccountsOverdue | 28 Mar 2026 |
| Medium | Workday ISU Integration Credential Not Rotated in 18 MonthsOverdue | 28 Mar 2026 |
| Medium | 67 SailPoint Role Assignments Not Reviewed in 12 Months; 12 Over-PrivilegedOverdue | 28 Mar 2026 |
| Medium | Privileged Session Manager Not Mandatory for 4 High-Privilege Safe GroupsOverdue | 28 Mar 2026 |
| Medium | 34 Repository Deploy Keys Older Than 180 Days; 8 With Write AccessOverdue | 28 Mar 2026 |
| Medium | CA-FederatedSessions: No Step-Up for Okta TokenOverdue | 29 Mar 2026 |
| Medium | 23 IAM Access Keys Not Rotated (>90 days)Overdue | 29 Mar 2026 |
| Medium | Inactive SAML Applications — 6 Apps With No Sign-In in >90 DaysOverdue | 29 Mar 2026 |
| Medium | Project-Level IAM Bindings for 4 Service Accounts Exceed Intended ScopeOverdue | 29 Mar 2026 |
| Medium | Pod Security Standards Not Enforced in 5 NamespacesOverdue | 29 Mar 2026 |
| Medium | Jump Clients Not Segregated by Network Zone; Production and Dev in Same Jump GroupOverdue | 29 Mar 2026 |
| Medium | 156 Users Without Phishing-Resistant MFA RegistrationOverdue | 30 Mar 2026 |
| Medium | Cross-Account Trust From Shared-Services Account Lacks Condition KeysOverdue | 30 Mar 2026 |
| Medium | 12 API Tokens Older Than 90 DaysOverdue | 30 Mar 2026 |
| Medium | BigQuery Finance Dataset Lacks Row-Level SecurityOverdue | 30 Mar 2026 |
| Medium | IRSA Role acme.role.k8s-data-access Has Broad S3 and DynamoDB PermissionsOverdue | 30 Mar 2026 |
| Medium | 47 Stale Computer Accounts With Active SPNs and Delegation AttributesOverdue | 30 Mar 2026 |
| Medium | 23 Slack Guest Users With Sensitive Channel Access Inactive >90 DaysOverdue | 30 Mar 2026 |
| Medium | Emergency Access Provisioning Bypasses Approval for 23 High-Risk EntitlementsOverdue | 30 Mar 2026 |
| Medium | 34 Accounts With Automatic Password Rotation Disabled; 12 Passwords Older Than 180 DaysOverdue | 30 Mar 2026 |
| Medium | 12 BeyondTrust Team Passwords Not Certified in 12 Months; 4 Reference Decommissioned SystemsOverdue | 30 Mar 2026 |
| Medium | GitHub Actions Permissions Allow All Actions From Any PublisherOverdue | 30 Mar 2026 |
| Low | 34 Inactive Guest Accounts (>90 days)Overdue | 31 Mar 2026 |
| Low | CloudTrail Not Enabled in 2 Subsidiary AccountsOverdue | 31 Mar 2026 |
| Low | Admin Role Assignments Lack Access Certification ReviewOverdue | 31 Mar 2026 |
| Low | GCP Audit Logs Not Exported to SIEM for 3 ProjectsOverdue | 31 Mar 2026 |
| Low | Container Images Not Scanned Before Deployment in 3 PipelinesOverdue | 31 Mar 2026 |
| Low | 6 Inactive SAML Apps With No Sign-Ins in 90 Days Still Active in OktaOverdue | 31 Mar 2026 |
| Low | SailPoint Audit Log Retention: 30 Days (Compliance Requirement: 12 Months)Overdue | 31 Mar 2026 |
Compliance snapshot
This appendix exposes the raw MRI demo findings behind the technical report. It is intended for engineering review and filtering, but it remains public demo data rather than a guarantee of live workflow parity on every authenticated route.
| ID | Severity | Platform | Title | Detected |
|---|---|---|---|---|
| EID-2K-H01 | High | Entra ID | 6 Permanent Global Administrator Assignments Without PIM Six independent paths to tenant-level control; each represents a persistent elevated attack surface. | 5 Mar 2026 |
| AWS-2K-H01 | High | AWS IAM | SAML Role With AdministratorAccess and No Condition Keys Any Entra SAML assertion bearer can assume full administrative access; no compensating control at role level. | 5 Mar 2026 |
| OKT-2K-H01 | High | Okta | Super Admin Accounts Accessible from Named Network Zone Without FIDO2 Super admin takeover via MFA fatigue or push interception attack from corporate network; high-value target for APT actors. | 5 Mar 2026 |
| GCP-2K-H01 | High | Google Cloud IAM | 6 Service Account Keys Unrotated (>90 days); 3 Exposed in CI/CD Long-lived SA keys in version control are a confirmed credential-theft risk; exfiltration window open for >30 days. | 5 Mar 2026 |
| K8S-2K-H01 | High | Kubernetes | 4 cluster-admin ClusterRoleBindings to Workload Service Accounts Four independent service-account paths to full cluster control; any container compromise in these namespaces yields cluster-admin. | 5 Mar 2026 |
| AD-2K-H01 | High | Active Directory | svc-entra-sync Has Domain Admins Membership; Password Age 289 Days Entra Connect sync account with Domain Admin rights; any Entra tenant compromise propagates to on-prem AD with full admin privileges. | 5 Mar 2026 |
| AD-2K-H02 | High | Active Directory | 3 Accounts With adminCount=1 Outside Protected Groups (AdminSDHolder) Accounts retain privileged AD object ACLs despite removal from admin groups; can modify account attributes and access protected resources. | 6 Mar 2026 |
| SAAS-2K-H01 | High | SaaS Applications | 4 Slack Workspace Admins Using Email/Password Auth Without Okta SSO Enforcement Slack workspace admins with standalone credentials cannot be centrally deprovisioned via Okta; data export and workspace management exposed to credential theft. | 5 Mar 2026 |
| SAAS-2K-H02 | High | SaaS Applications | Salesforce System Admin Profile: 9 Users, 3 Without Step-Up MFA System Administrator compromise grants full Salesforce access including customer PII, pipeline data, and all integration credentials. | 6 Mar 2026 |
| SAIL-2K-H01 | High | SailPoint | IT Annual Access Review: 89 Open Items Past SLA; 34 Auto-Approved 34 entitlements approved without genuine review; 89 items past SLA and likely to be auto-approved; campaign governance value critically undermined. | 5 Mar 2026 |
| SAIL-2K-H02 | High | SailPoint | SailPoint Connector Accounts Over-Privileged on Target Systems SailPoint connector compromise propagates Domain Admin and cluster-admin rights to all connected systems; IGA platform is a high-value lateral movement pivot. | 6 Mar 2026 |
| CA-2K-H01 | High | CyberArk | 23 Privileged Accounts With No Dual-Control Enforcement on Password Retrieval Privileged credentials retrievable by a single operator without secondary approval; any compromised CyberArk user account yields uncontrolled privileged access to 23 production accounts. | 5 Mar 2026 |
| CA-2K-H02 | High | CyberArk | Shared "VaultAdmin" Account — No Individual Accountability for CyberArk Admin Operations CyberArk administrative actions cannot be attributed to an individual operator; shared admin credential is a single point of compromise for the entire PAM platform. | 6 Mar 2026 |
| BT-2K-H01 | High | BeyondTrust | BeyondTrust Admin Credential Unchanged 380 Days; Used by 3 Named Administrators BeyondTrust platform admin credential shared and not rotated for over a year; compromise of any of the 3 admin users yields unrestricted PAM platform access affecting all managed accounts. | 5 Mar 2026 |
| GH-2K-H01 | High | GitHub | OIDC Not Configured; 47 Deployment Workflows Use Long-Lived Cloud Credentials Long-lived cloud credentials embedded in 47 workflows are accessible to all repository contributors; OIDC short-lived tokens would eliminate static credentials from CI/CD. | 5 Mar 2026 |
| GH-2K-H02 | High | GitHub | 4 GitHub Organisation Owners Use Personal Accounts — Bypass Enterprise SSO 4 org owners operate outside enterprise SSO, SCIM, and Okta deprovisioning; any of these accounts becoming compromised yields GitHub org-owner access outside the identity lifecycle. | 6 Mar 2026 |
| EID-2K-M01 | Medium | Entra ID | CA-FederatedSessions: No Step-Up for Okta Token Okta session compromise propagates to Entra without additional authentication challenge. | 6 Mar 2026 |
| EID-2K-M02 | Medium | Entra ID | 156 Users Without Phishing-Resistant MFA Registration Large cohort vulnerable to SIM-swap and MFA-fatigue attacks. | 7 Mar 2026 |
| EID-2K-M03 | Medium | Entra ID | Service Principal Secret Expiry: 23 Secrets > 180 Days Old Long-lived service principal secrets extend the window of undetected credential theft. | 8 Mar 2026 |
| AWS-2K-M01 | Medium | AWS IAM | 23 IAM Access Keys Not Rotated (>90 days) Large population of static credentials increases probability of undetected exfiltration. | 6 Mar 2026 |
| AWS-2K-M02 | Medium | AWS IAM | Cross-Account Trust From Shared-Services Account Lacks Condition Keys Compromise of shared-services account propagates to all trusted accounts without per-account constraints. | 7 Mar 2026 |
| AWS-2K-M03 | Medium | AWS IAM | S3 Bucket acme.bucket.customer-data Has Overly Permissive Bucket Policy Root-level S3 access to customer PII bucket bypasses least-privilege controls; root account should not have direct bucket policy grants. | 8 Mar 2026 |
| OKT-2K-M01 | Medium | Okta | Inactive SAML Applications — 6 Apps With No Sign-In in >90 Days Active SAML integrations with no recent usage represent unmaintained trust relationships that may be exploited if credentials are reused. | 6 Mar 2026 |
| OKT-2K-M02 | Medium | Okta | 12 API Tokens Older Than 90 Days Orphaned API tokens attached to deprovisioned user accounts create persistent API access vectors. | 7 Mar 2026 |
| OKT-2K-M03 | Medium | Okta | Okta Inline Hook Not Validated — Authentication Policy Bypass Authentication policy hook not validating risk signals; hook returns allow regardless of risk context, defeating the risk-based authentication policy. | 8 Mar 2026 |
| GCP-2K-M01 | Medium | Google Cloud IAM | Project-Level IAM Bindings for 4 Service Accounts Exceed Intended Scope IaC drift: 4 service accounts have accumulated project-level access beyond their provisioned least-privilege baseline. | 6 Mar 2026 |
| GCP-2K-M02 | Medium | Google Cloud IAM | BigQuery Finance Dataset Lacks Row-Level Security All 47 data engineers can read all rows in the finance dataset; no row-level partitioning by data sensitivity or business unit. | 7 Mar 2026 |
| GCP-2K-M03 | Medium | Google Cloud IAM | Org Policy Constraint iam.disableServiceAccountKeyCreation Not Enforced Users with SA Admin role can create arbitrary static keys; org-level constraint not enforced despite being in security baseline. | 8 Mar 2026 |
| K8S-2K-M01 | Medium | Kubernetes | Pod Security Standards Not Enforced in 5 Namespaces Privileged pod creation permitted in 5 namespaces; attacker can create hostPID or hostNetwork pods to escape to node level. | 6 Mar 2026 |
| K8S-2K-M02 | Medium | Kubernetes | IRSA Role acme.role.k8s-data-access Has Broad S3 and DynamoDB Permissions Three Kubernetes service accounts can read and write all S3 buckets and DynamoDB tables in the AWS account via IRSA. | 7 Mar 2026 |
| K8S-2K-M03 | Medium | Kubernetes | Secrets Not Encrypted at Rest (etcd); Using Kubernetes Secrets Without KMS All Kubernetes secrets (API keys, database passwords, TLS certs) accessible in plaintext to anyone with etcd or cluster-admin access. | 8 Mar 2026 |
| AD-2K-M01 | Medium | Active Directory | 47 Stale Computer Accounts With Active SPNs and Delegation Attributes High volume of stale accounts with SPNs and delegation creates a persistent Kerberoasting and constrained delegation lateral movement surface. | 7 Mar 2026 |
| AD-2K-M02 | Medium | Active Directory | Fine-Grained Password Policy Not Applied to 86 Service Accounts Service accounts requiring 30-day rotation and complex passwords operate under the same lenient policy as standard user accounts. | 8 Mar 2026 |
| SAAS-2K-M01 | Medium | SaaS Applications | 23 Slack Guest Users With Sensitive Channel Access Inactive >90 Days Inactive vendor guests retain access to sensitive channels including incident response; no offboarding triggered by inactivity. | 7 Mar 2026 |
| SAAS-2K-M02 | Medium | SaaS Applications | Workday ISU Integration Credential Not Rotated in 18 Months Long-lived credential with access to all Workday employee records; compromise enables enumeration of full HR dataset including personal data. | 8 Mar 2026 |
| SAIL-2K-M01 | Medium | SailPoint | Emergency Access Provisioning Bypasses Approval for 23 High-Risk Entitlements Emergency bypass used for routine high-risk provisioning; privileged access granted without manager or security approval. | 7 Mar 2026 |
| SAIL-2K-M02 | Medium | SailPoint | 67 SailPoint Role Assignments Not Reviewed in 12 Months; 12 Over-Privileged Uncertified roles accumulate entitlements beyond design intent; 12 roles confirmed over-privileged by automated role mining analysis. | 8 Mar 2026 |
| CA-2K-M01 | Medium | CyberArk | 34 Accounts With Automatic Password Rotation Disabled; 12 Passwords Older Than 180 Days Service accounts without rotation rely on manual management; static long-lived credentials increase the theft-to-detection window. | 7 Mar 2026 |
| CA-2K-M02 | Medium | CyberArk | Privileged Session Manager Not Mandatory for 4 High-Privilege Safe Groups Direct privileged sessions bypass CyberArk recording and isolation; credential abuse outside PSM is forensically undetectable. | 8 Mar 2026 |
| BT-2K-M01 | Medium | BeyondTrust | Jump Clients Not Segregated by Network Zone; Production and Dev in Same Jump Group An operator with dev-zone jump client access can reach production infrastructure jump clients within the same group without additional access controls or approval gates. | 6 Mar 2026 |
| BT-2K-M02 | Medium | BeyondTrust | 12 BeyondTrust Team Passwords Not Certified in 12 Months; 4 Reference Decommissioned Systems Shared team passwords accumulate without access review; entries for decommissioned systems may still grant access if accounts on target systems remain active. | 7 Mar 2026 |
| GH-2K-M01 | Medium | GitHub | GitHub Actions Permissions Allow All Actions From Any Publisher Any action from any publisher — including unverified or malicious ones — can execute in workflows; supply-chain attack vector via unvetted action publishers. | 7 Mar 2026 |
| GH-2K-M02 | Medium | GitHub | 34 Repository Deploy Keys Older Than 180 Days; 8 With Write Access Stale write-access deploy keys remain valid indefinitely; no lifecycle management removes them when underlying integrations are retired. | 8 Mar 2026 |
| EID-2K-L01 | Low | Entra ID | 34 Inactive Guest Accounts (>90 days) Stale external access increasing identity surface; low exploitability but fails audit requirements. | 9 Mar 2026 |
| AWS-2K-L01 | Low | AWS IAM | CloudTrail Not Enabled in 2 Subsidiary Accounts API activity in subsidiary accounts is unlogged; detection and forensic capability blind spot. | 9 Mar 2026 |
| OKT-2K-L01 | Low | Okta | Admin Role Assignments Lack Access Certification Review Admin role assignments have not been attested; accumulation risk for stale privilege over time. | 9 Mar 2026 |
| GCP-2K-L01 | Low | Google Cloud IAM | GCP Audit Logs Not Exported to SIEM for 3 Projects Development and staging environment activity unforwarded to SIEM; lateral movement from non-prod to prod environment would not trigger SIEM alerts. | 9 Mar 2026 |
| K8S-2K-L01 | Low | Kubernetes | Container Images Not Scanned Before Deployment in 3 Pipelines Vulnerable base images may be deployed without detection; unpinned images allow supply-chain substitution. | 9 Mar 2026 |
| SAAS-2K-L01 | Low | SaaS Applications | 6 Inactive SAML Apps With No Sign-Ins in 90 Days Still Active in Okta Unused SAML trusts extend federation surface unnecessarily; should be reviewed for decommissioning. | 9 Mar 2026 |
| SAIL-2K-L01 | Low | SailPoint | SailPoint Audit Log Retention: 30 Days (Compliance Requirement: 12 Months) Provisioning audit trail unavailable beyond 30 days; forensic investigation outside retention window is impossible. | 9 Mar 2026 |
Technical Report · Prepared by IdentityFirst Ltd · Prepared for Acme Corp · Ref IF-TECH-RUN-MRI- · v1.0 · Confidential - Demonstration Use Only · SAMPLE - SYNTHETIC DATA - NOT FOR DISTRIBUTION