In any organization, it is crucial to know who has access to what resource, and how that access is being utilized. With insider threats representing the primary vector of data breaches, it is unacceptable for users to have more access than they need, as this raises the risk of data breach. But it is equally intolerable for a user to have less access than they need, as this affects efficiency and productivity. On top of these, meeting the security and privacy requirements various standards and regulations are important more than ever.