Audits
You want to implement an IAM solution,
but you still need to comply
with regulations (SOX, LSF, Basel 3, Solvency 2), you need an ISO 27002 (or 27001/17799)/COBIT/CMMI/EBIOS/MEHARI/OCTAVE-certified quality
management system or you have noticed that the security of your IS has been compromised because:
- permissions have been granted as applications have been integrated and the IS has grown ('IS spaghetti');
- out-of-date accounts are still active;
- permissions (either with or without remote access) have been granted excessively;
- access permissions are systematically extended;
- it is difficult to ascertain who has access to generic accounts;
- permissions are granted on an emergency basis without taking into account the requisite security measures
due to the company expanding or mergers/acquisitions meaning that matters are generally being dealt with as quickly as possible;
- systems or administrator accounts have been allocated on an unlimited basis;
- etc.
In-depth knowledge of access permissions is key to successfully managing an information system:
Who is allowed to do What, How and Why ?
Top of page