Auditing your user groups can be time-consuming, but is essential to ensuring there are no redundancies in accounts, no levels of inappropriate and therefore risky access for some users, or other potential problems. Use the checklist to:

  • Audit your overall provisioning/deprovisioning processes.
  • Review your internal, privileged, remote, and external users.
  • Review your change management processes (what happens when a user changes a role – how is that communicated?).

Taking the time to identity and rectify possible issues creates fewer headaches for you in the future.

Also In

Build an Identity Security Services Plan

Secure your weakest links: your users.

Related Content

Social

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.