icon
Search...
icon

Access Review

What is User Access Review?

A user access review is the process of periodically assessing the rights of anyone who has access to enterprise systems and data, it’s looks at who’s accessing what, and if they have valid reasons for accessing the enterprise’ assets. Users can include employees, partners, third-parties, service providers and vendors.

Threats mitigated by a user access review:

Privilege Creep: Happens when employees obtain access to lots of sensitive data during the time they work at an organization.

Excessive privileges: Access privileges can be granted only to users that need them only to do their jobs.

Access misuse: 15% of data breaches happen because of access and data misuse

Insider threats: Danger of insiders comes from the fact that they have access to sensitive data and know about security measures implemented.

To reduce risks associated with User Access:

  • Review and verify who has access to the organization’s systems and services.
  • The business owner is to review and update the information gathering sheet and share the updated sheet with Cloud Operation Center at COC@site.sa
  • Restrict the use of shared accounts and minimize the access to third-parties.
Updated at 2024-01-29