User Access Appropriateness Checklist


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Auditing your user groups can be time-consuming, but is essential to ensuring there are no redundancies in accounts, no levels of inappropriate and therefore risky access for some users, or other potential problems. Use the checklist to:

  • Audit your overall provisioning/deprovisioning processes.
  • Review your internal, privileged, remote, and external users.
  • Review your change management processes (what happens when a user changes a role – how is that communicated?).

Taking the time to identity and rectify possible issues creates fewer headaches for you in the future.

Related Content

GET HELP Contact Us
×
VL Methodology