To maintain your system’s security on a continuous basis, it is best to audit user access to all applications, and what they can do in those applications, networks, and other enterprise assets periodically. It is imperative to review all accesses to find any unauthorized access or over access, validate accesses as certified or revoked, and ensure the availability of an audit trail. Such an access re-certification exercise is undertaken on annual basis in almost all organizations nowadays to ensure that only enough access is provided to a user, based on their requirements, and the said user is not given excess access than needed.
Key Takeways
Generate app certification campaign
Ensure reviewing of entire user base
Provide specific guidance to the reviewers
Encapsulate access into entities such as roles
Flag high-risk access
Download the white paper
Learn some of the best practices for managing access re-certification
Related Topics
E-Book
Expanding the purview of Consumer focussed IAM
The advent of General Data Protection Regulation (GDPR) and its impact worldwide a strict regulatory environment is shaping up. Businesses need a close look at Consumer/customer facing IAM practices…