A user access review is the process of periodically assessing the rights of anyone who has access to enterprise systems and data, it’s looks at who’s accessing what, and if they have valid reasons for accessing the enterprise’ assets. Users can include employees, partners, third-parties, service providers and vendors.
Privilege Creep: Happens when employees obtain access to lots of sensitive data during the time they work at an organization.
Excessive privileges: Access privileges can be granted only to users that need them only to do their jobs.
Access misuse: 15% of data breaches happen because of access and data misuse
Insider threats: Danger of insiders comes from the fact that they have access to sensitive data and know about security measures implemented.
To reduce risks associated with User Access: