Access reviews are the bedrock of a sound Identity and Access Management strategy. What peanut butter is to jelly, and Tom is to Jerry, ensuring user appropriate user access is key to meeting all security and compliance initiatives in the enterprise.
When establishing an access certification and review process, enterprises should develop a strategy that:
* First, establishes full visibility of user entitlements and roles across the organization
* Then, shifts away from manual processes and automates authorization and access certification
* Provides a business-friendly view of entitlements in relationship to the business roles established by the organization
* Maintains a system of record for evidence of compliance
* Automates change management and entitlement remediation
Before all of this can become reality, though, organizations have to first do some deep thinking internally and decide whether they want the line of business (supervisors), application owners, or both, as the ones making important access decisions.
Continue in Aveksa Blog