SlideShare a Scribd company logo
Cloud Compliance Identity and Access Assessment (IdAA) Use Case Demo, Oct 2009
Identity and Access Assessment Excess entitlements typically increase over time Primary cause is employee transfers, role changes Prior entitlements often maintained through transition period, then fall through the cracks New transfers often provisioned with rights of most-entitled employee in new department But human error and operational issues also lead to excessive access rights, virtually impossible to detect – without Cloud Compliance Identifying excessive access rights is only part of the solution Fault isolation and root cause identification are essential to remediate underlying processes Cloud Compliance provides complete solution for identification and remediation of excessive access rights
How does IdAA work? Access audit owner visits Cloud Compliance site Browser-based wizard guides owner through automated data collection process Which resources to audit Access rights Login history/logs Data uploaded to secure Cloud Compliance site Compliance assessments provided within minutes Management metrics Trends, problem isolation and root cause analysis Integrating IdAA into access control processes can eliminate audit findings for excessive access rights and other access control issues
The Excess Rights Dashboard The Excess Rights Dashboard presents a multidimensional view of least privilege compliance by showing the recent trend as well as a breakdown by application, by group or department, and by user.
The Excess Rights Dashboard This view presents FFIEC audited applications for a financial services firm.  Resource views can be defined for specific audits – FFIEC, SOX, PCI, internal, etc.
The Excess Rights Dashboard Access control assessment results are indicated for each dimension: time; resource; group or department; and users. Trends and problem areas are easily identified.
The Excess Rights Dashboard Scale-independent metrics measure performance along each dimension, and are the basis for objective-setting.  Here, we look at dormant rights percentage to measure least privilege compliance performance.
The Excess Rights Dashboard Overall performance is tracked by the upper-left status indicator. In this case, 7% of accounts are dormant – higher than the 6% objective and therefore colored red.
The Excess Rights Dashboard This trend tells us that prior to Cloud Compliance being deployed, access controls were not performing well.  Then, using our solution, dormant rights were significantly reduced.  But dormant rights have jumped up this month…
The Excess Rights Dashboard In the Resource view, we see that Equity Trade is the likely source of this month’s increase in dormant rights.  We can click on that application to see what’s going on.
Equity Trade We have now isolated Equity Trade from all other applications. Note that the Trend, By User Group and By User displays have all been updated to reflect the new view.
Equity Trade We see that the problem lies with the Bond Traders group.  They have been provisioned with rights to Equity Trading that are now dormant. Let’s drill into the Bond Traders group to investigate.
Bond Traders Now we have isolated the view to Bond Traders with provisioned rights to the Equity Trade application.
Bond Traders We see that Bond Traders are broken into Executives and three Trader sub-groups.  It looks like Executives have a business need, but the Bond Traders sub-groups don’t need access to the Equity Trade application.
Bond Traders In the User view, we see that these Traders all went dormant on the same day. If the dormant policy is 60 days, then they were all granted rights 67 days ago.
Bond Traders In this case, an HR admin granted these rights based on generic job descriptions.  Mergers, layoffs, and ad-hoc rights requests often lead to the same result.
IdAA Results Identified access control deficiency Determined root cause Knowledge to fix problem and underlying process Avoid repetitive find/fix cycles Part of an ongoing management process Automated data collection, analysis and visualization Before auditors arrive No fire drills required Relevant metrics support informed management decision-making
Thank You! For further information, contact Cloud Compliance: Cloud Compliance, Inc. 1250 Oakmead Pkwy # 210 Sunnyvale, CA 94085 (408) 501-8812 [email_address] www.cloud-compliance.com   Blog:  www.cloud-compliance.com/blog

More Related Content

PDF
4 common headaches with sales compensation management
PPTX
Rule for Year 2 of Quality Payment Program
PDF
Advantages of an integrated governance, risk and compliance environment
PPT
How It All Ties Together Sun Idm Roadshow For Sun
PDF
Case Study: How a fortune 500 global security company reduced SoD Auditing by...
PPT
Oracle systems & control for financial org.
PDF
Government Modernization
PPTX
The Leaky Pipe for Insurance - what's preventing you from increasing revenues...
4 common headaches with sales compensation management
Rule for Year 2 of Quality Payment Program
Advantages of an integrated governance, risk and compliance environment
How It All Ties Together Sun Idm Roadshow For Sun
Case Study: How a fortune 500 global security company reduced SoD Auditing by...
Oracle systems & control for financial org.
Government Modernization
The Leaky Pipe for Insurance - what's preventing you from increasing revenues...

What's hot (18)

PPTX
Third Party Risk Management
PDF
The Compliance Gap
PDF
Managing Cloud identities in Hybrid Cloud | Sysfore
PDF
Transaction Watchdog by Controls Force
PDF
Do you really know your third party providers?
PDF
Software Advice UserView: Legal Management Software Report 2015
PDF
Applying Automation to What Ails Healthcare
PDF
PDF
PracticeLeague Litigation Management Platform
PDF
XsXprt
PDF
IT Asset Management System for UL-Software Engineering
PPTX
Automation in healthcare industry
PDF
PracticeLeague Compliance Management Platform
PDF
Corporate Treasury – Rising to the Cloud
 
DOCX
Audit software highlights
PDF
It52015 slides
PDF
AutoRek - Automated Reconciliation and Exception Management
PDF
Computer aided audit techniques and fraud detection
Third Party Risk Management
The Compliance Gap
Managing Cloud identities in Hybrid Cloud | Sysfore
Transaction Watchdog by Controls Force
Do you really know your third party providers?
Software Advice UserView: Legal Management Software Report 2015
Applying Automation to What Ails Healthcare
PracticeLeague Litigation Management Platform
XsXprt
IT Asset Management System for UL-Software Engineering
Automation in healthcare industry
PracticeLeague Compliance Management Platform
Corporate Treasury – Rising to the Cloud
 
Audit software highlights
It52015 slides
AutoRek - Automated Reconciliation and Exception Management
Computer aided audit techniques and fraud detection
Ad

Viewers also liked (6)

PPT
Thompson Ahern-CSCB Trade Compliance Integrity July 2008a
PDF
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...
PDF
Equity Exercise Management & Taxing Compliance Project Process Flows
PDF
Export Compliance Management Seminar 29 May 2012: Automated Trade Compliance ...
PPTX
Corporate presentation october_2011
PDF
CohnReznick Private Equity Services
Thompson Ahern-CSCB Trade Compliance Integrity July 2008a
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...
Equity Exercise Management & Taxing Compliance Project Process Flows
Export Compliance Management Seminar 29 May 2012: Automated Trade Compliance ...
Corporate presentation october_2011
CohnReznick Private Equity Services
Ad

Similar to Cloud Compliance Use Case Demo (20)

PDF
Sap grc-access-control-solution
PDF
Segregation of Duties Solutions
PDF
Sap GRC Basic Information | GRC 12 online training
DOCX
Complete Guide to Fine-Grained Access Review.docx
PDF
Dit yvol5iss38
PPT
Building Your Roadmap Sucessful Identity And Access Management
PDF
6 Ways to Ensure the Success of your Next Contractor Self Assessment
PPT
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
PDF
NACD Directorship_Sept-Oct 2016_Director Advisory_Eisner
PDF
How vulnerable are you to insider attacks?.pdf
PPTX
Common Governance, Risk, and Compliance Challenges and How to Tackle Them.pptx
PPTX
Webinar: Trust Exchange for Lenders-PPP Loan Forgiveness Platform
PDF
Dit yvol3iss33
PDF
Cyber Security Certifications.pdf
PDF
About SOC 2 Compliance
PDF
About SOC 2 Compliance
PDF
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
PDF
Audit and Compliance BDR Knowledge Training
PPTX
How Compliance Management Software Solves Modern Compliance Challenges.pptx
PPTX
How Compliance Management Software Solves Modern Compliance Challenges.pptx
Sap grc-access-control-solution
Segregation of Duties Solutions
Sap GRC Basic Information | GRC 12 online training
Complete Guide to Fine-Grained Access Review.docx
Dit yvol5iss38
Building Your Roadmap Sucessful Identity And Access Management
6 Ways to Ensure the Success of your Next Contractor Self Assessment
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
NACD Directorship_Sept-Oct 2016_Director Advisory_Eisner
How vulnerable are you to insider attacks?.pdf
Common Governance, Risk, and Compliance Challenges and How to Tackle Them.pptx
Webinar: Trust Exchange for Lenders-PPP Loan Forgiveness Platform
Dit yvol3iss33
Cyber Security Certifications.pdf
About SOC 2 Compliance
About SOC 2 Compliance
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Audit and Compliance BDR Knowledge Training
How Compliance Management Software Solves Modern Compliance Challenges.pptx
How Compliance Management Software Solves Modern Compliance Challenges.pptx

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Tartificialntelligence_presentation.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Machine Learning_overview_presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Getting Started with Data Integration: FME Form 101
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Assigned Numbers - 2025 - Bluetooth® Document
Tartificialntelligence_presentation.pptx
Network Security Unit 5.pdf for BCA BBA.
Machine Learning_overview_presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
MIND Revenue Release Quarter 2 2025 Press Release
NewMind AI Weekly Chronicles - August'25-Week II
Getting Started with Data Integration: FME Form 101
Spectral efficient network and resource selection model in 5G networks
Diabetes mellitus diagnosis method based random forest with bat algorithm
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Advanced methodologies resolving dimensionality complications for autism neur...
Programs and apps: productivity, graphics, security and other tools
Reach Out and Touch Someone: Haptics and Empathic Computing
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Cloud Compliance Use Case Demo

  • 1. Cloud Compliance Identity and Access Assessment (IdAA) Use Case Demo, Oct 2009
  • 2. Identity and Access Assessment Excess entitlements typically increase over time Primary cause is employee transfers, role changes Prior entitlements often maintained through transition period, then fall through the cracks New transfers often provisioned with rights of most-entitled employee in new department But human error and operational issues also lead to excessive access rights, virtually impossible to detect – without Cloud Compliance Identifying excessive access rights is only part of the solution Fault isolation and root cause identification are essential to remediate underlying processes Cloud Compliance provides complete solution for identification and remediation of excessive access rights
  • 3. How does IdAA work? Access audit owner visits Cloud Compliance site Browser-based wizard guides owner through automated data collection process Which resources to audit Access rights Login history/logs Data uploaded to secure Cloud Compliance site Compliance assessments provided within minutes Management metrics Trends, problem isolation and root cause analysis Integrating IdAA into access control processes can eliminate audit findings for excessive access rights and other access control issues
  • 4. The Excess Rights Dashboard The Excess Rights Dashboard presents a multidimensional view of least privilege compliance by showing the recent trend as well as a breakdown by application, by group or department, and by user.
  • 5. The Excess Rights Dashboard This view presents FFIEC audited applications for a financial services firm. Resource views can be defined for specific audits – FFIEC, SOX, PCI, internal, etc.
  • 6. The Excess Rights Dashboard Access control assessment results are indicated for each dimension: time; resource; group or department; and users. Trends and problem areas are easily identified.
  • 7. The Excess Rights Dashboard Scale-independent metrics measure performance along each dimension, and are the basis for objective-setting. Here, we look at dormant rights percentage to measure least privilege compliance performance.
  • 8. The Excess Rights Dashboard Overall performance is tracked by the upper-left status indicator. In this case, 7% of accounts are dormant – higher than the 6% objective and therefore colored red.
  • 9. The Excess Rights Dashboard This trend tells us that prior to Cloud Compliance being deployed, access controls were not performing well. Then, using our solution, dormant rights were significantly reduced. But dormant rights have jumped up this month…
  • 10. The Excess Rights Dashboard In the Resource view, we see that Equity Trade is the likely source of this month’s increase in dormant rights. We can click on that application to see what’s going on.
  • 11. Equity Trade We have now isolated Equity Trade from all other applications. Note that the Trend, By User Group and By User displays have all been updated to reflect the new view.
  • 12. Equity Trade We see that the problem lies with the Bond Traders group. They have been provisioned with rights to Equity Trading that are now dormant. Let’s drill into the Bond Traders group to investigate.
  • 13. Bond Traders Now we have isolated the view to Bond Traders with provisioned rights to the Equity Trade application.
  • 14. Bond Traders We see that Bond Traders are broken into Executives and three Trader sub-groups. It looks like Executives have a business need, but the Bond Traders sub-groups don’t need access to the Equity Trade application.
  • 15. Bond Traders In the User view, we see that these Traders all went dormant on the same day. If the dormant policy is 60 days, then they were all granted rights 67 days ago.
  • 16. Bond Traders In this case, an HR admin granted these rights based on generic job descriptions. Mergers, layoffs, and ad-hoc rights requests often lead to the same result.
  • 17. IdAA Results Identified access control deficiency Determined root cause Knowledge to fix problem and underlying process Avoid repetitive find/fix cycles Part of an ongoing management process Automated data collection, analysis and visualization Before auditors arrive No fire drills required Relevant metrics support informed management decision-making
  • 18. Thank You! For further information, contact Cloud Compliance: Cloud Compliance, Inc. 1250 Oakmead Pkwy # 210 Sunnyvale, CA 94085 (408) 501-8812 [email_address] www.cloud-compliance.com Blog: www.cloud-compliance.com/blog

Editor's Notes

  • #5: So let’s look at an example of how it works ….. This is the Excess Rights Dashboard. It presents a multidimensional view of how effectively users are provisioned and de-provisioned across applications, groups, and over time. Overall performance is tracked by the status indicator in the upper left It also identifies problems emerging along the various dimensions of access and identity. Problems with a specific application, group, or even an outlying user are extracted from the noise. Scale-independent metrics measure overall performance along each dimension. In this case we are looking at dormant rights as an indicator of how well rights are provisioned. Configurable management objectives allow you to set goals and compare results to your objectives. In this case, we are looking at a view that focuses on a group of applications that are in scope for an FFIEC audit in the financial services industry. You can set up audit views that are specific to specific audits – FFIEC, SOX, internal, PCI, etc. The trend view tells us that when we first deployed Cloud Compliance, the firm learned that they were not performing well, but using our analysis, they were able to manage it down to reasonable levels. We also see that recently excess rights are creeping back up. By looking at the Resource view, we see that the Equity Trade is the likely source of the problem. We can click on that application to isolate that application to see what’s going on.
  • #6: So let’s look at an example of how it works ….. This is the Excess Rights Dashboard. It presents a multidimensional view of how effectively users are provisioned and de-provisioned across applications, groups, and over time. Overall performance is tracked by the status indicator in the upper left It also identifies problems emerging along the various dimensions of access and identity. Problems with a specific application, group, or even an outlying user are extracted from the noise. Scale-independent metrics measure overall performance along each dimension. In this case we are looking at dormant rights as an indicator of how well rights are provisioned. Configurable management objectives allow you to set goals and compare results to your objectives. In this case, we are looking at a view that focuses on a group of applications that are in scope for an FFIEC audit in the financial services industry. You can set up audit views that are specific to specific audits – FFIEC, SOX, internal, PCI, etc. The trend view tells us that when we first deployed Cloud Compliance, the firm learned that they were not performing well, but using our analysis, they were able to manage it down to reasonable levels. We also see that recently excess rights are creeping back up. By looking at the Resource view, we see that the Equity Trade is the likely source of the problem. We can click on that application to isolate that application to see what’s going on.
  • #7: So let’s look at an example of how it works ….. This is the Excess Rights Dashboard. It presents a multidimensional view of how effectively users are provisioned and de-provisioned across applications, groups, and over time. Overall performance is tracked by the status indicator in the upper left It also identifies problems emerging along the various dimensions of access and identity. Problems with a specific application, group, or even an outlying user are extracted from the noise. Scale-independent metrics measure overall performance along each dimension. In this case we are looking at dormant rights as an indicator of how well rights are provisioned. Configurable management objectives allow you to set goals and compare results to your objectives. In this case, we are looking at a view that focuses on a group of applications that are in scope for an FFIEC audit in the financial services industry. You can set up audit views that are specific to specific audits – FFIEC, SOX, internal, PCI, etc. The trend view tells us that when we first deployed Cloud Compliance, the firm learned that they were not performing well, but using our analysis, they were able to manage it down to reasonable levels. We also see that recently excess rights are creeping back up. By looking at the Resource view, we see that the Equity Trade is the likely source of the problem. We can click on that application to isolate that application to see what’s going on.
  • #8: So let’s look at an example of how it works ….. This is the Excess Rights Dashboard. It presents a multidimensional view of how effectively users are provisioned and de-provisioned across applications, groups, and over time. Overall performance is tracked by the status indicator in the upper left It also identifies problems emerging along the various dimensions of access and identity. Problems with a specific application, group, or even an outlying user are extracted from the noise. Scale-independent metrics measure overall performance along each dimension. In this case we are looking at dormant rights as an indicator of how well rights are provisioned. Configurable management objectives allow you to set goals and compare results to your objectives. In this case, we are looking at a view that focuses on a group of applications that are in scope for an FFIEC audit in the financial services industry. You can set up audit views that are specific to specific audits – FFIEC, SOX, internal, PCI, etc. The trend view tells us that when we first deployed Cloud Compliance, the firm learned that they were not performing well, but using our analysis, they were able to manage it down to reasonable levels. We also see that recently excess rights are creeping back up. By looking at the Resource view, we see that the Equity Trade is the likely source of the problem. We can click on that application to isolate that application to see what’s going on.
  • #9: So let’s look at an example of how it works ….. This is the Excess Rights Dashboard. It presents a multidimensional view of how effectively users are provisioned and de-provisioned across applications, groups, and over time. Overall performance is tracked by the status indicator in the upper left It also identifies problems emerging along the various dimensions of access and identity. Problems with a specific application, group, or even an outlying user are extracted from the noise. Scale-independent metrics measure overall performance along each dimension. In this case we are looking at dormant rights as an indicator of how well rights are provisioned. Configurable management objectives allow you to set goals and compare results to your objectives. In this case, we are looking at a view that focuses on a group of applications that are in scope for an FFIEC audit in the financial services industry. You can set up audit views that are specific to specific audits – FFIEC, SOX, internal, PCI, etc. The trend view tells us that when we first deployed Cloud Compliance, the firm learned that they were not performing well, but using our analysis, they were able to manage it down to reasonable levels. We also see that recently excess rights are creeping back up. By looking at the Resource view, we see that the Equity Trade is the likely source of the problem. We can click on that application to isolate that application to see what’s going on.
  • #10: So let’s look at an example of how it works ….. This is the Excess Rights Dashboard. It presents a multidimensional view of how effectively users are provisioned and de-provisioned across applications, groups, and over time. Overall performance is tracked by the status indicator in the upper left It also identifies problems emerging along the various dimensions of access and identity. Problems with a specific application, group, or even an outlying user are extracted from the noise. Scale-independent metrics measure overall performance along each dimension. In this case we are looking at dormant rights as an indicator of how well rights are provisioned. Configurable management objectives allow you to set goals and compare results to your objectives. In this case, we are looking at a view that focuses on a group of applications that are in scope for an FFIEC audit in the financial services industry. You can set up audit views that are specific to specific audits – FFIEC, SOX, internal, PCI, etc. The trend view tells us that when we first deployed Cloud Compliance, the firm learned that they were not performing well, but using our analysis, they were able to manage it down to reasonable levels. We also see that recently excess rights are creeping back up. By looking at the Resource view, we see that the Equity Trade is the likely source of the problem. We can click on that application to isolate that application to see what’s going on.
  • #11: So let’s look at an example of how it works ….. This is the Excess Rights Dashboard. It presents a multidimensional view of how effectively users are provisioned and de-provisioned across applications, groups, and over time. Overall performance is tracked by the status indicator in the upper left It also identifies problems emerging along the various dimensions of access and identity. Problems with a specific application, group, or even an outlying user are extracted from the noise. Scale-independent metrics measure overall performance along each dimension. In this case we are looking at dormant rights as an indicator of how well rights are provisioned. Configurable management objectives allow you to set goals and compare results to your objectives. In this case, we are looking at a view that focuses on a group of applications that are in scope for an FFIEC audit in the financial services industry. You can set up audit views that are specific to specific audits – FFIEC, SOX, internal, PCI, etc. The trend view tells us that when we first deployed Cloud Compliance, the firm learned that they were not performing well, but using our analysis, they were able to manage it down to reasonable levels. We also see that recently excess rights are creeping back up. By looking at the Resource view, we see that the Equity Trade is the likely source of the problem. We can click on that application to isolate that application to see what’s going on.
  • #12: By clicking on equity trade we has isolated equity trade activity from all other applications to see what’s going on with that application. Here we see that the problem is obviously with the bond traders group. It looks like that group has been provisioned with a lot of rights to the Equity Trading application that they are not using. Now let’s drill into the Bond Trading Group to see what’s going on there.
  • #13: By clicking on equity trade we has isolated equity trade activity from all other applications to see what’s going on with that application. Here we see that the problem is obviously with the bond traders group. It looks like that group has been provisioned with a lot of rights to the Equity Trading application that they are not using. Now let’s drill into the Bond Trading Group to see what’s going on there.
  • #14: Now we further isolated the view to just equity trade, and just Bond Traders. Now we can see that Bond Traders are broken into 4 sub groups. A group of executives and three groups of traders. It looks like the executive have a legitimate need, but the traders themselves really don’t need access to equity trading. By looking at the by User view, we can see that all the dormant users went dormant on the same day. This particular application has a dormant period setting of 60 days, so it looks like all of these users were granted rights in one fell swoop 60 days ago. A lot of process problems could be at the heart of this result. An HR or IT person got a couple of requests from traders for access and got tired of going through the process so he just gave the rights to everyone. An executive wanted one of his guys to have access so he just requested access for the group. Reorganizations, layoffs, mergers, or just new role management initiatives in which HR and IT are trying to guess at rights based upon corporate job descriptions can all lead to this same effect.
  • #15: Now we further isolated the view to just equity trade, and just Bond Traders. Now we can see that Bond Traders are broken into 4 sub groups. A group of executives and three groups of traders. It looks like the executive have a legitimate need, but the traders themselves really don’t need access to equity trading. By looking at the by User view, we can see that all the dormant users went dormant on the same day. This particular application has a dormant period setting of 60 days, so it looks like all of these users were granted rights in one fell swoop 60 days ago. A lot of process problems could be at the heart of this result. An HR or IT person got a couple of requests from traders for access and got tired of going through the process so he just gave the rights to everyone. An executive wanted one of his guys to have access so he just requested access for the group. Reorganizations, layoffs, mergers, or just new role management initiatives in which HR and IT are trying to guess at rights based upon corporate job descriptions can all lead to this same effect.
  • #16: Now we further isolated the view to just equity trade, and just Bond Traders. Now we can see that Bond Traders are broken into 4 sub groups. A group of executives and three groups of traders. It looks like the executive have a legitimate need, but the traders themselves really don’t need access to equity trading. By looking at the by User view, we can see that all the dormant users went dormant on the same day. This particular application has a dormant period setting of 60 days, so it looks like all of these users were granted rights in one fell swoop 60 days ago. A lot of process problems could be at the heart of this result. An HR or IT person got a couple of requests from traders for access and got tired of going through the process so he just gave the rights to everyone. An executive wanted one of his guys to have access so he just requested access for the group. Reorganizations, layoffs, mergers, or just new role management initiatives in which HR and IT are trying to guess at rights based upon corporate job descriptions can all lead to this same effect.
  • #17: Now we further isolated the view to just equity trade, and just Bond Traders. Now we can see that Bond Traders are broken into 4 sub groups. A group of executives and three groups of traders. It looks like the executive have a legitimate need, but the traders themselves really don’t need access to equity trading. By looking at the by User view, we can see that all the dormant users went dormant on the same day. This particular application has a dormant period setting of 60 days, so it looks like all of these users were granted rights in one fell swoop 60 days ago. A lot of process problems could be at the heart of this result. An HR or IT person got a couple of requests from traders for access and got tired of going through the process so he just gave the rights to everyone. An executive wanted one of his guys to have access so he just requested access for the group. Reorganizations, layoffs, mergers, or just new role management initiatives in which HR and IT are trying to guess at rights based upon corporate job descriptions can all lead to this same effect.