Back to Videos
November 9, 2017
The common audit violations within an enterprise or organization are:
Excessive Access given to users
Segregation of Duty Violations
In this 5 part demo series we will look into the need of Role Based Access Control (RBAC) as well as implementing the solution (IBM Security Identity and Governance Intelligence).
In the previous episode "Provisioning" we saw that Allan Wake (awake) had all the required accounts and permissions provisioned to him, however in this episode he would need to request an additional role which was not assigned to him originally. We will guide you on how "awake" can request this role as well as the responsibilities of a Risk Manager and User Manager in this scenario.