Security / Internal Controls

  • Orphan accounts (no owner).
  • Dormant accounts (unused).
  • Segregation of duties (fraud risk).
  • Inconsistent, unreliable approvals.
  • Stale, inappropriate rights.


IT Support

  • Volume of change requests.
  • Ambiguous problem descriptions.


  • Difficult to audit (who has what?).
  • No history (how did they get it?).
  • Weak link between accounts and human owners.
  • Weak link between entitlements and business need.

User Service

  • Obscure change request forms.
  • Slow approvals, service fulfillment.
  • Language barrier between IT and business users.