Skip to content

Application Management

The Applications page provides visibility into all applications discovered across your connected data sources. Monitor application security posture, track account distribution, assess risk levels, and manage application ownership from a centralized dashboard.

Overview

Applications in Hydden.Control represent the systems, services, and platforms where your organization's accounts exist. The Applications module helps you:

  • Discover applications from connected data sources (Entra, Okta, Workday, etc.)
  • Monitor security posture through risk scores and metrics
  • Track account distribution across your application portfolio
  • Identify security issues like stale accounts, MFA gaps, and privileged access
  • Assign ownership for governance and accountability

Applications List

The Applications list displays all discovered applications with key information and filtering capabilities.

List Columns

ColumnDescription
Application NameApplication display name with optional description
PlatformData source platform (Entra, Okta, etc.) with logo
AccountsTotal count of associated accounts
Risk ScoreAverage risk score with color-coded badge
OwnerAssigned application owner
CreatedApplication creation date

Risk Score Indicators

Applications are categorized by their average risk score:

CategoryScore RangeIndicator
High RiskGreater than 70Red badge
Medium Risk41-70Yellow badge
Low Risk40 or belowGreen badge

View Modes

Toggle between two view modes:

ModeDescriptionBest For
Table ViewRow-based list with columnsDetailed comparison, sorting
Grid ViewCard-based responsive layoutVisual overview, quick scanning

Click the view toggle buttons to switch between modes.


Filtering and Searching

Quick Filters

At the top of the page, stat cards provide one-click filtering:

  • Total - Show all applications
  • High Risk - Applications with risk score > 70
  • Medium Risk - Applications with risk score 41-70
  • Low Risk - Applications with risk score ≤ 40

Click a stat card to filter the list to that category.

Filter Dropdowns

FilterOptions
PlatformFilter by data source (Entra, Okta, Workday, etc.)
StatusAll Status, Active, Inactive, Deprecated

Use the search box to find applications by name:

  • Search is real-time with automatic debouncing
  • Press / (forward slash) to focus the search box
  • Click the clear button (X) to reset the search

Sorting

Sort applications by:

Sort OptionDescription
Risk (High→Low)Highest risk first (default)
Risk (Low→High)Lowest risk first
Name (A→Z)Alphabetical
Name (Z→A)Reverse alphabetical
Accounts (Most)Most accounts first
Accounts (Least)Fewest accounts first
Newest FirstMost recently created
Oldest FirstOldest first

Application Details

Click an application name to open the details page with comprehensive information.

Application Information

FieldDescription
NameApplication display name
Application IDUnique identifier for the application
DescriptionOptional application description
PlatformSource data platform (data source name and platform type)
Data SourceSource system identifier and name
OwnerAssigned application owner (platform user)
StatusActive, Inactive, or Deprecated
CriticalityCriticality level (Critical, High, Medium, Low)
EnvironmentEnvironment type (Production, Staging, Development, etc.)
Authentication MethodHow users authenticate (SSO, LDAP, Local, etc.)
URLApplication URL or access endpoint
Compliance RequiredWhether compliance tracking is enabled
Risk ScoreApplication risk score (0-100) based on account risks
Data ClassificationData sensitivity classification (Public, Internal, Confidential, Restricted)
Technical ContactTechnical point of contact
Business ContactBusiness point of contact
Last Review DateWhen the application was last reviewed
Next Review DateScheduled next review date

Application Reviewers

Applications can have assigned reviewers who are responsible for reviewing access:

  • Reviewer Assignments: Assign specific platform users to review an application
  • Reviewer Types: Assign individual users, groups, or role-based reviewers
  • Department Scoping: Restrict reviewers to specific departments
  • Account Type Scoping: Restrict reviewers to specific account types
  • Active/Inactive Status: Enable or disable reviewer assignments

To manage application reviewers:

  1. Open the application details page
  2. Navigate to the Reviewers tab
  3. Click Add Reviewer to assign new reviewers
  4. Configure reviewer type, department filter, and account type filter
  5. Set the reviewer status (Active/Inactive)

Risk Assessment

The risk assessment section displays:

  • Average Risk Score - Calculated from all associated accounts
  • Total Accounts - Number of accounts with access
  • Last Updated - When data was last synchronized

Security Metrics

The details page includes comprehensive security metrics:

MFA Status

  • MFA Disabled Count: Total accounts with MFA disabled
  • MFA Disabled Percentage: Percentage of accounts without MFA protection

Password Issues

Accounts grouped by password age:

CategoryCountDescription
Never Setpassword_never_set_countAccounts that have never set a password
90+ Dayspassword_age_90_countPasswords older than 90 days
180+ Dayspassword_age_180_countPasswords older than 180 days
365+ Dayspassword_age_365_countPasswords older than 1 year

Stale Accounts

Accounts grouped by inactivity period:

CategoryCountDescription
90+ Daysstale_90_days_countInactive for over 90 days
180+ Daysstale_180_days_countInactive for over 180 days
365+ Daysstale_365_days_countInactive for over 1 year

Stale Account Percentage

The system automatically calculates the percentage of stale accounts (180+ days) relative to total accounts, helping prioritize cleanup efforts.

Privileged Accounts

MetricDescription
Total PrivilegedAccounts with elevated permissions
Highly PrivilegedAccounts with the highest privilege levels (super admin, domain admin, etc.)
Not VaultedPrivileged accounts not stored in a password vault
Privileged Not Vaulted PercentagePercentage of privileged accounts without vault protection

Account Status Distribution

StatusDescription
ActiveCurrently active accounts
DisabledDisabled accounts
SuspendedTemporarily suspended accounts

Account Type Distribution

TypeDescription
User AccountsStandard user accounts
Service AccountsNon-human service accounts
Admin AccountsAdministrative accounts

Other Risk Indicators

MetricDescription
Shared AccountsAccounts used by multiple people
No OwnerAccounts without an assigned owner
BreachedAccounts flagged in known breach databases
Failed LoginsAccounts with recent failed login attempts

Application Roles

Application roles (also called entitlements) represent the permissions and access rights within an application. These are distinct from organizational job roles.

What they are: Application roles are specific entitlements like "Global Administrator" in Entra ID or "Auditors" in CyberArk. Hydden Discovery syncs these roles, and Control displays them for governance visibility.

FieldDescription
Role NameThe role identifier
Display NameHuman-readable role name
ProviderSource platform (CyberArk, Microsoft, etc.)
DomainRole domain (e.g., cyberark.cloud)
Direct CountAccounts directly assigned this role
Expanded CountTotal accounts including nested assignments

To view application roles:

  1. Open the application details page.
  2. Navigate to the Roles tab.
  3. Browse or search the roles list.

Application role memberships are synced from Hydden Discovery and show which accounts hold which entitlements within each application.

Field Distributions

Application statistics include field distributions showing the breakdown of:

  • Custom field values across accounts
  • Attribute distributions for reporting and analysis
  • Risk metric aggregations

Account Distribution Charts

Visual charts display:

  • Stale Accounts by Period - Bar chart showing account staleness distribution
  • Accounts by Type - Pie chart showing service, user, and admin account breakdown
  • Accounts by Status - Distribution of active, disabled, and suspended accounts

Associated Accounts

The Associated Accounts section displays all accounts linked to the application.

Account Table Columns

ColumnDescription
Account NameAccount identifier
EmailAccount email address
Risk LevelIndividual account risk with icon indicator
Account TypeUser, Service, Admin, etc.
DepartmentAccount's department
StatusActive or Disabled with status indicator

Searching Accounts

Use the search box within the Associated Accounts section to filter accounts by name or email.

Pagination

Accounts load progressively as you scroll. The table displays accounts in batches for optimal performance.


Managing Applications

Updating Application Owner

Administrators can update an application's owner:

  1. Open the application details page.
  2. Click Edit next to the Owner field.
  3. Select a platform user from the searchable dropdown.
  4. Click Save.

The owner assignment helps establish accountability for application governance.

Synchronizing Applications

To update application data from source systems:

  1. Click Sync Applications in the quick actions area.
  2. The sync job starts and runs in the background.
  3. Monitor progress in Job History.

For new tenants without data, use Run sync to discover applications on the initial setup.

Schedule Automatic Sync

Configure automatic synchronization in Data Sync settings to keep application data current without manual intervention.


Keyboard Shortcuts

ShortcutAction
/Focus search box
/ Navigate between applications
EnterOpen selected application details

Access Requirements

RoleAccess Level
AdministratorFull access - view, sync, update owner
ReviewerRead-only (scoped to assigned applications)
AuditorRead-only (scoped to assigned applications)

Reviewers and Auditors see only applications within their configured scope. See Platform Users for scope configuration.


Best Practices

  1. Review high-risk applications first - Sort by risk score and prioritize remediation
  2. Assign owners - Ensure every application has an accountable owner
  3. Monitor MFA coverage - Address applications with low MFA adoption
  4. Address stale accounts - Review and disable accounts inactive for extended periods
  5. Vault privileged accounts - Ensure privileged credentials are properly secured
  6. Regular sync - Keep data current with scheduled synchronization
  7. Use filters effectively - Combine platform and status filters to focus your review

Hydden Documentation and Training Hub