Reporting
The way in which results from an audit are formalised will vary depending on the audience for whom they are intended. Many different people are involved in security and
risk management and each needs to be provided with information that is relevant to their specific needs.
The level of detail required will increase depending on whether the results are being sent to the CEO,
the risk management department or the information security officer and their team.
While the CEO will want an overview of the security of the IS in chart format,
the risk management department needs a more detailed picture so that they can evaluate the risks and the information security officer
will require the most specific data in order to implement appropriate corrective measures for their IS.
KLEVERWARE formalises audit results directly using its own tool. As a result, each organisation or company can view their results:
- in chart format, for an overview of users, groups of users and access permissions for the IS;
- or as a detailed list, for identifying and correcting authorisation errors.
KLEVERWARE has designed a solution that does not interfere with the IS and uses data gathered from databases
across the company or organisation's entire IS (applications, LDAP directories, Active Directory, RACF databases, TSS, etc.)
to compile a comprehensive report on access permissions for the IS and their use, not only at a given moment but also over time.
This parameterisable tool also allows licensees to make comparisons
between individuals, groups and departments.
These audit reports:
- give information security officers and their teams all the details on anomalies they need to be able to rectify them;
- can be used to compile charts, reports for AGMs or documents for the risk management department.
The impact of any new element can be observed prior to it being created in real life to avoid interfering with any ongoing rationalisation.
Top of page