Zulamus Enterprise Platform

Dynamic business, client, and cybersecurity transformation platform

CareBrain Health System — Employee Directory Sample

View Identity Risk Dashboard

This page shows a realistic sample of employee and access-risk data. The full company is simulated as 118,000 employees, but this page displays a controlled sample for cybersecurity/IAM analysis.

MetricValue
Total Simulated Employees118,000
Visible Sample Records20
Privileged Users1,240 simulated privileged users
Vendor Accounts380 simulated vendor accounts
Known Identity RisksNo MFA, privileged access, terminated active account, vendor access

Employee Access Directory

Employee IDNameJob TitleDepartmentLocation System AccessPrivilegedMFA StatusRisk LevelStatus
CB-EMP-10001Amina HassanRegistered NurseNursingDallas Medical Center EHR, Patient PortalNoNot EnrolledMediumActive
CB-EMP-10002Daniel BrooksSystems AdministratorInformation TechnologyData Operations Center AD, VPN, EHR AdminYesNot EnrolledCriticalActive
CB-EMP-10003Sofia PatelPharmacistPharmacyPharmacy Central Pharmacy Manager, EHRNoEnrolledHighActive
CB-EMP-10004Michael TurnerChief Medical OfficerClinical OperationsDallas HQ EHR, Reporting, Clinical DashboardYesEnrolledCriticalActive
CB-EMP-10005Grace LeeLab TechnicianLaboratory ServicesDallas Medical Center LabTrack, EHRNoNot EnrolledMediumActive
CB-EMP-10006James WilsonRadiology ManagerRadiologyHouston Hospital ImageVault, EHRYesNot EnrolledHighActive
CB-EMP-10007Fatima AliClaims SupervisorInsurance ClaimsClaims Center ClaimsPro, BillingHubNoEnrolledHighActive
CB-EMP-10008Noah BrownBilling AnalystPatient BillingClaims Center BillingHubNoNot EnrolledMediumActive
CB-EMP-10009Olivia DavisClinic ManagerClinical OperationsNorth Clinic EHR, Staff SchedulerYesEnrolledHighActive
CB-EMP-10010Ethan MartinezEmergency Services ManagerEmergency DepartmentDallas Medical Center EHR, Emergency IntakeYesNot EnrolledCriticalActive
CB-EMP-10011Mia JacksonClinical App AnalystInformation TechnologyData Operations Center EHR Admin, HelpDeskYesNot EnrolledCriticalActive
CB-EMP-10012Benjamin WhiteHelpdesk AnalystInformation TechnologyData Operations Center HelpDesk, AD BasicNoEnrolledMediumActive
CB-EMP-10013Rachel JohnsonChief Financial OfficerFinanceDallas HQ FinanceCore, Billing ReportsYesEnrolledHighActive
CB-EMP-10014Luis GarciaVP Claims OperationsInsurance ClaimsClaims Center ClaimsPro, BillingHubYesNot EnrolledCriticalActive
CB-EMP-10015Sarah KimContractor NurseNursingRemote Workforce EHRNoNot EnrolledHighContractor
CB-EMP-10016David MillerFormer Billing ContractorPatient BillingRemote Workforce BillingHubNoNot EnrolledCriticalTerminated - Access Active
CB-EMP-10017Isabella TaylorVendor Support EngineerVendor AccessRemote EHR Support PortalYesNot EnrolledCriticalVendor
CB-EMP-10018William MooreSenior Nurse ManagerNursingHouston Hospital EHR, Staff SchedulerYesEnrolledHighActive
CB-EMP-10019Emily WilliamsRevenue Cycle DirectorPatient BillingClaims Center BillingHub, ClaimsProYesEnrolledHighActive
CB-EMP-10020Mason ThomasDatabase AdministratorInformation TechnologyData Operations Center EHR DB, Billing DBYesNot EnrolledCriticalActive

Initial IAM Findings

FindingCount / ExampleRiskRecommended Action
Privileged users without MFAExample: IT admins, claims admins, EHR adminsCriticalImplement MFA for all privileged users first
Terminated user still activeExample: CB-EMP-10016CriticalDisable account and review JML process
Vendor account with privileged accessExample: CB-EMP-10017CriticalReview vendor access and require approval expiration
Clinical users without MFAMultiple examplesHighRoll out MFA by department and system criticality