Skip to main content

Core Concepts

Mission Control's audit system stores four categories of data: identities (who), permissions (what they can access), access events (what they actually accessed), and resources (infrastructure state). Understanding how these relate is key to building effective audits.

Domain Model

How Entities Relate

Mission Control scrapes identity providers (Entra ID, AWS IAM, Kubernetes RBAC, databases) into users, groups, and roles. Users belong to groups, and roles define permission sets.

Permissions link users, groups, and roles to specific resources — the infrastructure items in your catalog (AWS accounts, Azure subscriptions, Kubernetes clusters, databases, etc.). This answers "who can access what."

Access events record individual access actions — who accessed a resource, when, and whether they used MFA. This answers "who did access what."

The Application CRD ties all of this together, mapping identity data, permissions, and infrastructure into a single auditable unit per application.

Key Terms

ConceptDescription
UserA user from an identity provider (Entra ID, IAM, database).
GroupA team, department, or security group from an identity provider.
RoleA permission set (e.g. Admin, Reader) that can be assigned to users or groups.
PermissionA record linking a user, group, or role to a resource — represents a permission grant. (DB: config_access)
Access EventAn individual access action with timestamp, MFA status, and metadata. (DB: config_access_log)
ResourceAn infrastructure item in the catalog (config item) that permissions and events reference.
ApplicationA CRD that maps all of the above into a single auditable unit for a specific application.

See Config Access Reference for the full database schema and field reference.