Identity & Access Management Security Dashboard
A simulated enterprise IAM dashboard demonstrating identity risk detection, MFA compliance, privileged access monitoring, and access governance.
25
Total Users
60.0%
MFA Enabled
11
Privileged Accounts
7
High Risk Users
3
Locked Accounts
49
Failed Login Events
24.0%
Untrusted Devices
8
Stale Accounts
MFA Compliance by Department
Risk Distribution
Failed Login Attempts by Department
Privileged Access Distribution
User Risk Table
| Name | Department | Role | Last Login | MFA | Failed Logins | Account | Privileged | Device Trust | Risk |
|---|---|---|---|---|---|---|---|---|---|
| James Rodriguez | Engineering | Admin | 3 hours ago | Disabled | 5 | Active | Yes | Untrusted | Critical |
| Kevin Wright | HR | Admin | 90 days ago | Disabled | 0 | Disabled | Yes | Unknown | Critical |
| Ashley White | Finance | Admin | 35 days ago | Disabled | 6 | Locked | Yes | Untrusted | Critical |
| Tyler Scott | Sales | Admin | 2 weeks ago | Disabled | 9 | Locked | Yes | Untrusted | Critical |
| Michael Brown | Operations | Manager | 60 days ago | Disabled | 8 | Locked | No | Untrusted | High |
| Jessica Thompson | Operations | User | 3 days ago | Disabled | 4 | Active | No | Untrusted | High |
| Lauren Hall | Finance | User | 55 days ago | Disabled | 7 | Active | No | Untrusted | High |
| Emily Watson | HR | User | 45 days ago | Disabled | 0 | Active | No | Unknown | Medium |
| Robert Taylor | Finance | User | 5 days ago | Disabled | 3 | Active | No | Unknown | Medium |
| Andrew Wilson | Sales | User | 40 days ago | Disabled | 0 | Active | No | Unknown | Medium |
| Marcus Chen | IT | Global Admin | 2 hours ago | Enabled | 0 | Active | Yes | Trusted | Low |
| Sarah Mitchell | Finance | Manager | 1 day ago | Enabled | 1 | Active | No | Trusted | Low |
| David Kim | Executive | Security Admin | 30 min ago | Enabled | 0 | Active | Yes | Trusted | Low |
| Jennifer Lopez | Sales | User | 2 days ago | Enabled | 2 | Active | No | Trusted | Low |
| Amanda Foster | IT | Admin | 1 hour ago | Enabled | 0 | Active | Yes | Trusted | Low |
| Lisa Anderson | Engineering | User | 4 hours ago | Enabled | 0 | Active | No | Trusted | Low |
| Nicole Martinez | Sales | Manager | 6 hours ago | Enabled | 1 | Active | No | Trusted | Low |
| Christopher Lee | Executive | Global Admin | 15 min ago | Enabled | 0 | Active | Yes | Trusted | Low |
| Daniel Garcia | IT | Security Admin | 20 min ago | Enabled | 0 | Active | Yes | Trusted | Low |
| Matthew Johnson | Engineering | Manager | 2 hours ago | Enabled | 0 | Active | No | Trusted | Low |
| Stephanie Davis | HR | User | 1 week ago | Enabled | 2 | Active | No | Trusted | Low |
| Megan Clark | Operations | Admin | 5 hours ago | Enabled | 1 | Active | Yes | Trusted | Low |
| Ryan Moore | IT | User | 12 hours ago | Enabled | 0 | Active | No | Trusted | Low |
| Brandon Allen | Engineering | Security Admin | 1 hour ago | Enabled | 0 | Active | Yes | Trusted | Low |
| Kimberly Young | Executive | Manager | 8 hours ago | Enabled | 0 | Active | No | Trusted | Low |
Identity Risk Engine
Risk scores are calculated based on multiple identity factors:
- No MFA enabled
- Multiple failed login attempts
- Privileged account access
- Untrusted device detected
- Stale login (>30 days)
- Locked account status
Operational Insights
- 10users without MFA enabled
- 4privileged accounts without MFA
- 7high-risk users requiring review
- 3locked accounts needing investigation
- 8stale accounts inactive >30 days
Recommended Actions
- Enforce MFA for all users
- Review privileged accounts without MFA
- Investigate high failed login users
- Disable or audit stale accounts
- Review untrusted device access
Zero Trust Security Alignment
This dashboard supports Zero Trust security principles through continuous identity verification and risk assessment.
Verify Explicitly
Every access request is authenticated and authorized based on available data points including user identity, device, and location.
Least Privilege Access
Monitor privileged accounts and ensure users have only the access they need to perform their role.
Assume Breach
Continuously monitor for anomalies, track failed logins, and identify potential compromised accounts.
How This Works in Production
Identity Provider
Entra ID / Okta
Authentication Logs
Real-time events
Risk Detection Engine
ML-based scoring
IAM Dashboard
Visualization
Security Response
IT / SOC Team
Skills Demonstrated
Resume-Ready Highlights
- Built a production-style IAM security dashboard simulating enterprise identity environments to track MFA compliance, privileged access, failed login activity, and user risk scoring.
- Designed risk-based identity monitoring workflows to identify high-risk users, stale accounts, and access vulnerabilities.
- Demonstrated Zero Trust principles by modeling identity verification, least privilege access, and continuous risk evaluation.
Secure Identity Starts with Visibility
Ready to discuss how I can help secure your organization's identity infrastructure?