













Identify and automatically revoke over-permissioned users, dormant accounts, and privileged access before they expose sensitive defense and operational data across your environment.
Track user behavior, permission changes, failed logons, and unusual access patterns in real-time to detect threats earlier and accelerate investigations.
Maintain visibility into user activity, permission changes, and access to sensitive data across Active Directory, Microsoft 365, and hybrid environments to support CMMC auditing requirements and remain compliant.
| CMMC requirement | Control | How Lepide helps |
|---|---|---|
| Limit system access to authorized users, processes, and devices. | AC.L2-3.1.1 | Identify and automatically revoke excessive permissions, inherited access, inactive user accounts and privileged users across Active Directory, Microsoft 365, and file servers. |
| Limit information system access to the types of transactions and functions authorized users are permitted to execute. | AC.L2-3.1.2 | Strengthen least privilege policies and reduce unnecessary access to Controlled Unclassified Information (CUI). |
| Employ the principle of least privilege, including for specific security functions and privileged accounts. | AC.L2-3.1.5 | Identify exactly who can access sensitive defense and operational data so you can reduce unnecessary access and privileged exposure. |
| Create and retain system audit logs and records to enable monitoring, analysis, investigation, and reporting. | AU.L2-3.3.1 | Maintain searchable audit trails and centralized visibility into user activity, permission changes, and access to sensitive data. |
| Review and update logged events. | AU.L2-3.3.3 | Monitor user behavior, failed logons, group membership changes, and unusual access patterns across hybrid environments. |
| Monitor and control remote access sessions. | AC.L2-3.1.12 | Track authentication activity, privileged account usage, and suspicious remote access behavior. |
| Identify information system users, processes acting on behalf of users, and devices. | IA.L2-3.5.1 | Monitor privileged account activity, failed logons, and suspicious authentication behavior across hybrid environments. |
| Monitor information systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks. | SI.L2-3.14.6 | Detect suspicious behavior and accelerate and automate investigations through real-time alerts, centralized auditing, and visibility into user activity. |
| Perform periodic scans of information systems and real-time scans of files from external sources. | SI.L2-3.14.5 | Monitor access to files and folders containing Controlled Unclassified Information across hybrid environments. |
| Track, review, approve, and audit changes to systems. | CM.L2-3.4.1 | Monitor changes to permissions, configurations, administrative groups, and privileged accounts in real time. Automatically revoke excessive permissions. |
Organizations working within the Defense Industrial Base (DIB) often have concerns about excessive permissions, lack sufficient visibility into user activity, have limited accountability, and find difficulty with the increasing requirements to protect Controlled Unclassified Information across hybrid environments.
Lepide helps IT and security teams by providing visibility over their environment to uncover hidden access risks, identify and automatically remediate any excessive permissions, continually monitor privileged users, and protect sensitive defense and operational data across Active Directory, Microsoft 365, and file servers.
Understand exactly who can access Controlled Unclassified Information, defense data, and operational systems across your environment. Lepide helps organizations identify excessive permissions, automate the reduction of unnecessary access, and strengthen least privilege policies without disrupting day-to-day operations.
Track user behavior, permission changes, failed logons, group membership changes, and anomalous user behavior across Active Directory, Microsoft 365, and file servers through centralized auditing, automated threat detection and real-time visibility.
Quickly investigate suspicious activity, privileged account misuse, and unauthorized access attempts through searchable audit trails, real-time alerts, and centralized visibility into user activity across hybrid environments.
Maintain visibility into user activity, permission changes, privileged groups, and access to sensitive data across Active Directory, Entra ID, Microsoft 365, and file servers to support CMMC auditing and accountability requirements.
Identify risky access patterns, excessive permissions, inactive user accounts, and suspicious behavior before they lead to unauthorized access or exposure of Controlled Unclassified Information. Lepide helps organizations strengthen access governance and improve visibility into how sensitive defense-related data is accessed and used across hybrid environments.
From CISOs to SecOps teams, find out how the NIST Cybersecurity Framework is evolving and what you should be doing to achieve and maintain a compliant cybersecurity posture.
Get the free guide now!