This document explains why it makes sense to implement robust processes to manage identities, entitlements and credentials before cleaning up legacy access rights.
It is important to strengthen controls, lower operating costs and improve user service first, as this halts the growth of inappropriate, high risk access rights. Only then does it make sense to analyze pre-existing users to find and remediate policy violations.
Access to this document requires registration. Please fill in the form below. The full document will be emailed to you automatically.