Identity Compliance Described
May 17, 2008- Supports enterprise level monitoring of access for segregation of duty (SoD) and security policy conflicts
- Ability to define rules across any platform / database / application or user’s attributes
- Support for inter and intra application security policy enforcement
- Monitoring of SoD, role vs actual exceptions, and terminated users with active accounts exceptions
- Comprehensive list of best practice segregation of duty controls provided out of box with the solution
- Complete lifecycle management of an audit issue
- Ability to provide a mitigating control for exceptions that are not fixed
- Ability to get manager sign off on audit exceptions
- Enterprise level compliance dashboard
- User Entitlement Certifications
– Managers certify users, roles, user entitlements, entitlements outside the assigned roles
– Data Owners certify users access to data components
– Workflow process for approvals on roles assignment/removal
– Reports on approvals/revoke requests for roles
– Maintains historical information on users access to various applications
– SoD violation scans
– User access audit policies creation and monitoring
- Regular scans
- Actual vs. Assigned Exceptions
- Exception Lifecycle Management
- Compliance Dashboard for Executives/Auditors