
Objectives
- Safeguard IT Systems to prevent unauthorized Access
- Detect unauthorized Access and trigger remediation Action
- All System Accounts centrally controlled
- Reconcile HRM domain data with IT User data

Best-Practices
- Periodically assessing the current Accesses and Authorizations
- Monitoring actual System Access and trigger (temporary) blocking of User Accounts
- Review Super Users Accounts and Super User logfiles

Solutions
- Periodic Access Review with configurable review scheme
- Workflow to support multi-step reviews and trigger additional resolution
- Workflow to support Request and Approval Process for Access or Role Changes