CIEM
Orca Security CIEM (Cloud Infrastructure Entitlement Management) is an identity‑focused module of Orca’s agentless CNAPP that discovers all human and machine identities, roles, policies and keys across AWS, Azure and GCP, rightsizes over‑privileged access, and continuously enforces least‑privilege. It correlates identity risks with workload, configuration and data context so you fix entitlements that actually create dangerous attack paths, not just theoretical IAM misconfigurations.
Orca CIEM runs on the same agentless platform and unified graph as Orca’s CSPM, CWPP and DSPM, ingesting cloud IAM objects (users, roles, groups, service principals, policies), activity data and SideScanning results to build a complete map of “who/what can access which resource, how, and with what risk.” It highlights identities with excessive or unused permissions, cross‑account trust, risky admin roles, unmanaged secrets (SSH keys, access keys, passwords in shell history) and compromised accounts, then prioritizes them by potential business impact and attack‑path context (e.g., overly‑privileged role on a VM that can reach an S3 bucket with PII).
Instead of a siloed CIEM point tool, Orca combines identity findings with vulnerabilities, misconfigurations, malware and data sensitivity to surface toxic combinations and lateral‑movement paths to critical assets. CIEM dashboards, an intuitive query builder and natural‑language AI queries make it easier for security and IAM teams to explore identity posture, answer questions like “who can access this storage resource?” and generate least‑privilege policy recommendations with Orca’s IAM Policy Optimizer.
Key Features
-
Multi‑cloud identity inventory & visibility – Centralized view of all cloud identities, roles, groups, policies, entitlements and activities across AWS, Azure and GCP, including human and machine identities.
-
Least‑privilege analysis & IAM Policy Optimizer – Continuously analyzes access patterns and unused permissions (90‑day lookback) to recommend rightsizing policies and generate optimal least‑privilege configs.
-
Advanced querying & AI‑assisted search – Thousands of built‑in alert templates, an intuitive query builder, an extensive query catalog and natural‑language AI to ask questions like “which roles can access this bucket with PII?”
-
Unmanaged identity & key discovery – Uses SideScanning to find SSH keys, cloud keys and passwords on workloads, hash them and correlate to authorized public keys, revealing which workloads and accounts they can access.
-
JIT (Just‑In‑Time) access management – Time‑bound, role‑specific access grants with central approval and full audit logs, including two‑way Slack integration for requesting/approving access.
-
Behavior & anomaly detection – Alerts on malicious or suspicious identity activity such as compromised accounts, stolen keys and unusual privilege use, with workflows to detect‑investigate‑respond through integrations.
-
Attack‑path visualization – Identity risks are combined with network reachability, vulnerabilities and data locations to show compound risks and direct paths to critical assets.
Ideal For & Use Cases
Ideal For
-
Organizations with complex multi‑cloud IAM (many accounts, subscriptions, projects) where manual entitlement audits are impossible.
-
Security and IAM teams wanting CIEM integrated with workload, posture and data security, not a standalone identity tool.
Representative Use Cases
-
Least‑privilege & access cleanup – Identify over‑privileged roles and unused permissions, then auto‑generate and test least‑privilege policies.
-
Cross‑account and third‑party risk reduction – Find risky cross‑account trusts, privileged roles with external access, and dormant admin identities.
-
Key & secret exposure hunting – Detect insecurely stored SSH keys and cloud access keys, see which workloads they unlock, and remediate before attackers exploit them.
-
Identity‑centric attack‑path reduction – Prioritize IAM fixes that, when combined with other weaknesses, form direct paths to sensitive storage, databases or production workloads.
Deployment & Technical Specs
-
Architecture: Part of the Orca SaaS CNAPP; uses cloud APIs and SideScanning (no agents) to inventory IAM objects, track activity, and scan workloads for unmanaged secrets.
-
Cloud Coverage: AWS IAM/IAM Roles, Azure AD / Entra roles and service principals, GCP IAM, plus keys and secrets discovered on workloads.
-
Data Model: Unified graph linking identities, policies, resources, network exposure, vulnerabilities and data locations for contextual IAM risk analysis.
-
Analytics & Queries: 1,300+ alert templates, query builder, continuous‑compliance query packs aligned to 185+ frameworks and CIS benchmarks, and natural‑language AI search.
-
JIT & Workflow: Central JIT access portal, Slack integration, granular audit logs, and bidirectional integrations with SOAR, ticketing and notification systems.
-
Onboarding: Connect cloud accounts with read‑only roles; Orca auto‑discovers identities and begins analyzing entitlement risks usually within a day.
Pricing & Plans
-
Licensing Model: CIEM is included in Orca’s single, all‑inclusive CNAPP SKU—there’s no separate CIEM license; pricing is based on the number of protected cloud workloads.
-
Typical Contract Values: Third‑party benchmarks show median Orca contracts around USD ~$84–86K/year for full CNAPP (CSPM, CWPP, CIEM, DSPM, etc.), often ~25–30% cheaper than some competing CNAPPs at similar scale.
-
Marketplaces & Public Sector: Also available via AWS Marketplace, Azure Marketplace and frameworks like UK G‑Cloud (listed at ~£290 per “unit,” with free trials).
Net: you don’t buy CIEM separately—if you license Orca CNAPP by workload, CIEM comes along for the ride.
Pros & Cons
Pros
-
Truly contextual CIEM: identity risks are analyzed alongside vulns, misconfigs and data sensitivity, enabling risk‑based IAM decisions.
-
Strong least‑privilege tooling via IAM Policy Optimizer and usage‑based rightsizing.
-
Unmanaged identity visibility (keys, passwords on workloads) that many CIEM point tools miss.
-
Integrated JIT and workflow make access grants auditable and time‑bound, not ticket‑driven ad‑hoc changes.
Cons
-
Available only as part of the broader Orca CNAPP; not ideal if you want a lightweight, CIEM‑only solution.
-
Enterprise‑oriented pricing can be high for very small cloud estates that mainly want basic IAM hygiene.
-
Effective use requires mature IAM processes; organizations with chaotic identity ownership may struggle to operationalize recommendations.
Final Verdict
Orca Security CIEM is best suited for organizations that view identity as the new perimeter and want to manage cloud entitlements in the same context as workload, configuration and data risk. Its ability to combine IAM analytics, unmanaged key discovery, least‑privilege optimization and attack‑path awareness goes beyond most standalone CIEM tools, but it comes as part of the full Orca CNAPP and is priced for mid‑to‑large environments. If you’re already considering Orca for CNAPP, its CIEM capabilities are a major reason to treat it as your central platform for cloud identities and entitlements.