User Access Appropriateness Checklist

Author(s): Jessica Ireland

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Auditing your user groups can be time-consuming, but is essential to ensuring there are no redundancies in accounts, no levels of inappropriate and therefore risky access for some users, or other potential problems. Use the checklist to:

  • Audit your overall provisioning/deprovisioning processes.
  • Review your internal, privileged, remote, and external users.
  • Review your change management processes (what happens when a user changes a role – how is that communicated?).

Taking the time to identity and rectify possible issues creates fewer headaches for you in the future.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019