Skip to main content

Roles and Permissions

Guardian Pro uses role-based access control (RBAC) to manage what users can see and do within the platform. Every user is assigned one of three roles, each providing a different level of access across Guardian Pro's feature modules.

The Three Roles

Guardian Pro provides three built-in roles designed to support common team structures:

Admin

The Admin role has full access to all Guardian Pro features, including the ability to manage users, modify organisation settings, and execute remediations.

Admins are typically:

  • Cloud architects or platform engineers responsible for AWS governance.
  • Security team leads who need to remediate findings directly.
  • IT managers overseeing the organisation's cloud posture.
note

Every organisation must have at least one Admin user. The user who completes the initial onboarding is automatically assigned the Admin role.

Standard

The Standard role provides broad read and write access to operational features but restricts sensitive actions such as remediation execution and user management.

Standard users are typically:

  • DevOps engineers who monitor infrastructure and review findings.
  • Developers who need visibility into security and cost data.
  • Analysts who review compliance reports and cost trends.

Read-Only

The Read-Only role provides view-only access across the platform. Read-Only users cannot modify any settings, execute remediations, or manage other users.

Read-Only users are typically:

  • Auditors reviewing compliance and security posture.
  • Executives or stakeholders viewing dashboards and reports.
  • External consultants who need visibility without the ability to make changes.

Permission Matrix

The table below shows the specific permissions granted to each role across Guardian Pro's six permission modules.

ModuleActionAdminStandardRead-Only
SecurityView findings and scan resultsYesYesYes
SecurityAcknowledge or suppress findingsYesYesNo
SecurityExecute remediationsYesNoNo
CostView cost analysis and recommendationsYesYesYes
CostRun cost analysis and modify budgetsYesYesNo
ResourcesView resource inventoryYesYesYes
AccountsView connected accountsYesYesYes
AccountsManage account connectionsYesNoNo
UsersView user listYesYesYes
UsersAdd or remove usersYesNoNo
UsersSend invitationsYesNoNo
OrganisationView organisation settingsYesYesYes
OrganisationModify organisation settingsYesNoNo

Permission Actions Explained

Each module supports up to three types of actions:

  • Read -- View data, dashboards, reports, and configuration. All roles have read access.
  • Write -- Modify settings, acknowledge findings, update configurations. Available to Admin and Standard roles (varies by module).
  • Specialised actions -- Module-specific actions like remediate (Security) and invite (Users). Available only to the Admin role.

How Permissions Are Enforced

Permissions are enforced at multiple levels:

  1. Navigation -- Settings pages and action buttons that require permissions you do not have are hidden from the interface.
  2. Page access -- If you navigate directly to a page you do not have permission for, you will see an Access Denied message.
  3. API level -- All API requests are validated against your role. Unauthorised requests are rejected regardless of how they are made.
info

Permission enforcement is consistent across the console, API, and AI Assistant. For example, if you ask the AI Assistant to remediate a finding and your role does not include remediation permissions, the assistant will inform you that the action requires elevated access.

Viewing Your Role

You can see your current role in several places:

  • User menu -- Click your name in the top-right corner to see your role badge.
  • Settings > Users -- Your entry in the user list shows your assigned role.

Changing Roles

Only Admin users can change another user's role. To change a role:

  1. Navigate to Settings > Users.
  2. Find the user whose role you want to change.
  3. Click the role badge or the Edit icon.
  4. Select the new role from the dropdown.
  5. Confirm the change.
caution

Role changes take effect immediately. If you downgrade a user from Admin to Standard, they will instantly lose access to remediation and user management features. Ensure the user is aware of the change.

Role Change Restrictions

  • You cannot change your own role.
  • You cannot remove the last Admin from an organisation. At least one Admin must exist at all times.
  • Role changes are logged in the audit trail for compliance purposes.

Feature Access Summary

Here is a high-level summary of which platform features each role can fully use:

FeatureAdminStandardRead-Only
DashboardFullFullView only
Action CentreFull (including remediation)View and acknowledgeView only
Cost IntelligenceFullView and run analysisView only
Compliance DashboardFullFullView only
Architecture AdvisorFullFullView only
AI AssistantFullFull (no remediation actions)Read-focused queries
Infrastructure WizardFullFullView only
Resource ExplorerFullFullView only
SettingsFullLimitedView only

Role Mappings

For organisations that want to automatically assign Guardian Pro roles based on existing AWS IAM roles, see Role Mappings. Role mappings allow you to define rules like "users who assume the SecurityAuditor IAM role should receive the Read-Only Guardian Pro role."

Next Steps

  • Users -- Manage users and their role assignments.
  • Role Mappings -- Automate role assignment based on AWS IAM roles.
  • Invitations -- Invite new users with pre-assigned roles.