information-rights-management , networking , security , web-services

Identity Compliance Described

May 17, 2008
  • Supports enterprise level monitoring of access for segregation of duty (SoD) and security policy conflicts
  • Ability to define rules across any platform / database / application or user’s attributes
  • Support for inter and intra application security policy enforcement
  • Monitoring of SoD, role vs actual exceptions, and terminated users with active accounts exceptions
  • Comprehensive list of best practice segregation of duty controls provided out of box with the solution
  • Complete lifecycle management of an audit issue
  • Ability to provide a mitigating control for exceptions that are not fixed
  • Ability to get manager sign off on audit exceptions
  • Enterprise level compliance dashboard
  • User Entitlement Certifications

– Managers certify users, roles, user entitlements, entitlements outside the assigned roles

– Data Owners certify users access to data components

– Workflow process for approvals on roles assignment/removal

– Reports on approvals/revoke requests for roles

– Maintains historical information on users access to various applications

– SoD violation scans

– User access audit policies creation and monitoring

  • Regular scans
  • Actual vs. Assigned Exceptions
  • Exception Lifecycle Management
  • Compliance Dashboard for Executives/Auditors