Cyrisma User Roles and Permissions
Last updated: December 23, 2025
Cyrisma uses role-based access control to ensure users can access only the features and data appropriate to their responsibilities. Roles differ between the MSP portal and client instances, and permissions are enforced strictly to maintain tenant isolation and security.
This article explains the available roles, what each role can do, and recommended best practices for assigning roles.
Understanding Role Scope in Cyrisma
Cyrisma operates in two contexts:
MSP Portal (
msp.cyrisma.com)Used by MSP staff to manage client environments
Client Instances (
https://<customer-instance>.cyrisma.com)Used by end customers to manage and remediate their own environment
Roles are scoped to one of these contexts and do not overlap unintentionally.
MSP Portal Roles
The following roles exist in the MSP portal.
Administrator (MSP)
Scope: MSP Portal
Instance Translation: Systems Administrator
Capabilities:
Full access to the MSP portal
Create, edit, and delete client instances
Access all client instances via single sign-on
Manage MSP users
Configure organization-wide settings
Reset passwords and disable users
This role has unrestricted access across all managed client environments.
Operator (MSP)
Scope: MSP Portal
Instance Translation: Departmental Manager
Capabilities:
Access client instances
View scan dashboards and results
Work with mitigation plans
View dark web results
View and manage assigned compliance tasks
Access industry comparisons and Shadow IT
This role is designed for operational oversight without administrative control.
Tech (MSP)
Scope: MSP Portal
Instance Translation: Security Administrator
Capabilities:
Access client instances
Perform security-related tasks within assigned instances
View and analyze scan results
Support remediation activities
This role is intended for MSP technical staff who perform hands-on security work but do not manage users or create instances.
Client Instance Roles
The following roles exist within individual client instances.
Systems Administrator
Scope: Client Instance
Capabilities:
Full access to all instance functionality
Create, edit, disable, and reset passwords for users
Configure system settings
Manage scan agents and provisioning
Configure and run scans
View and manage all results, dashboards, and reports
This is the highest-privilege role within a client environment.
Security Administrator
Scope: Client Instance
Capabilities:
Configure and run scans
View vulnerability, data, baseline, and mitigation results
Manage security-related settings
Access dashboards and reports
Restrictions:
Cannot manage users
Cannot provision or manage scan agents
This role is ideal for security-focused staff who should not have administrative control.
Departmental Manager
Scope: Client Instance
Capabilities:
View scan dashboards
Access mitigation plans
View dark web results
Work with assigned compliance tasks
Access industry comparisons and Shadow IT data
This role is intended for managers responsible for remediation oversight and compliance tracking.
Departmental User
Scope: Client Instance
Capabilities:
Access My Mitigation Plans
View assigned compliance tasks
This role is suitable for users who are responsible for completing specific remediation or compliance actions.
Executive
Scope: Client Instance
Capabilities:
View high-level dashboards only:
Data
Vulnerability
Secure Baseline
Mitigation
This role is read-focused and designed for leadership visibility without operational access.
Auditor
Scope: Client Instance
Capabilities:
Read-only access to all areas
View dashboards, scan results, and reports
Auditors cannot make changes or trigger scans.
Notification
Scope: Client Instance
Capabilities:
Receive system notifications only
This role does not grant access to the Cyrisma interface.
User Management Permissions
User management is restricted to the highest-privilege roles.
Action | MSP Portal | Client Instance |
Create users | Administrator | Systems Administrator |
Edit users | Administrator | Systems Administrator |
Disable users | Administrator | Systems Administrator |
Reset passwords | Administrator | Systems Administrator |
Client users are created and managed within the client instance by a Systems Administrator.
Role Separation & Access Boundaries
MSP users:
Automatically have access to all client instances
Cannot be restricted to specific clients
Client users:
Can only access their own instance
Cannot see MSP portal data or other clients
Roles do not cross tenant boundaries
This strict separation ensures security and tenant isolation.
Best-Practice Role Assignment (Recommended)
For MSPs
MSP Security Engineers: Tech
MSP Helpdesk / Operations Staff: Operator
MSP Platform Owners: Administrator
Limit Administrator assignments to a small number of trusted users.
For Client Organizations
Client IT Administrators: Systems Administrator
Client Security Team: Security Administrator
Department Managers / Compliance Leads: Departmental Manager
Remediation Task Owners: Departmental User
Executives / Leadership: Executive
Auditors / Assessors: Auditor
Roles Not Recommended for Broad Assignment
Administrator (MSP)
Systems Administrator (Client)
These roles grant full control and should be limited to reduce risk.
Summary
Cyrisma roles are designed to:
Enforce least-privilege access
Maintain strong tenant separation
Support both MSP and client workflows
Provide visibility without unnecessary control
Assigning the correct role ensures users can perform their responsibilities efficiently while preserving platform security.