Access Simulations

Simulation previews the effects of changes you might make in your security model to resolve incidents identified by access controls.

A simulation consists of remediation steps; each hypothesizes the removal of an access point from a role hierarchy. Incidents involving that access point (reached from within that hierarchy) would be resolved if the access point were actually removed.

You can create a simulation from a visualization of control incidents. This permits you to use the access points it depicts as the focus of remediation steps. This is preferred, because the simulation job is based on a single control, and so requires less time to run.

Or, you can begin from an Access Simulations page. This is typically not preferred, because the simulation job encompasses all controls, and so requires more time to run. This option, however, may be desirable if you want to simulate across controls, or if you know the access points to include in remediation steps and their relationships to access points in their role hierarchies.

To reach the Access Simulations page, select the Access Simulations tab in the Results work area. Each row in the page provides summary information about an existing simulation. Click the name of one to open a page that displays full details of its configuration.