Access Management Policy
Subscriber Content
A Tool for Ensuring Proper User Access to Systems and Applications
Ensure that access to all your organization’s systems and applications is properly approved and monitored with our Access Management Policy.
Under this policy, access to a company’s systems and applications must be properly approved and monitored to provide the highest levels of confidentiality, availability and integrity. The procedures in this policy can help provide overall guidance for the consistent granting, monitoring and removal of user access to the system environment. In these samples, access must be granted using approved and established role-based security, roles are well-defined and documented, and changes to access roles must follow the approval requirements.