User Access Appropriateness Checklist


Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Auditing your user groups can be time-consuming, but is essential to ensuring there are no redundancies in accounts, no levels of inappropriate and therefore risky access for some users, or other potential problems. Use the checklist to:

  • Audit your overall provisioning/deprovisioning processes.
  • Review your internal, privileged, remote, and external users.
  • Review your change management processes (what happens when a user changes a role – how is that communicated?).

Taking the time to identity and rectify possible issues creates fewer headaches for you in the future.

Related Content

GET HELP Contact Us
VL Methodology