User Access Review

Submitted by: Submitted by

Views: 263

Words: 1904

Pages: 8

Category: Business and Industry

Date Submitted: 07/12/2012 12:51 AM

Report This Essay

User Access Review Services

More information

Datasheet

Quote

User Access Reviews

A user access review is a process that an organization implements to actively monitor and verify the appropriateness of a users’ access to systems and applications based on an understanding of the minimum necessary for users to perform or support business activities or functions. The responsibility for granting access and performing periodic verification of the appropriateness of that access rests with the system and/or business owner of the system or application.

What can user access reviews do for you?

User access reviews help implement the principles of ‘least privileges’ based on business need and segregation of incompatible roles and functions. User access reviews serve to verify and validate that user access to systems and applications is appropriate given users’ roles and responsibilities within the organization.

ControlCase User Access Review Services

ControlCase’s User Access Review Services help our client’s manage the administratively burdensome task of establishing, verifying and monitoring user access to key business and support systems.

The ControlCase Managed Compliance Services team employs a systematic approach when assisting our clients to review current access rights and privileges for appropriateness, and then implementing an automated process to survey, verify, confirm and if necessary, modify access to critical systems on a monthly, quarterly, bi-yearly or yearly basis.

Our service provides an overall view into the access rights that all users have to the organization’s systems and applications, and allows our clients to demonstrate the implementation of ‘least privilege’ and segregation of critical functions within business systems in a cost effective and efficient manner.

All access modifications and additional that are identified are presented to the client to support verification activities. In addition, we confirm the removal or disablement of...