Permission Assist Overview
Identity access management (IAM) is a framework that guides organizations in managing digital identities and controlling user access. Most IAM recommendations and solutions tend to be great in theory, but in reality are very complex and hard (if not impossible) to implement. Permission Assist helps banks and credit unions implement a practical IAM approach to ensure identities are given the right level of access to the right things at the right time.
Provisioning - Accurate Permissions from Start to Finish
A practical approach to IAM starts by ensuring identities are given the appropriate access from the very beginning. The onboarding feature within Permission Assist uses role-based access models to onboard new identities with the right access from the very start. Additional provisioning features help maintain appropriate access throughout the lifecycle of an identity and as other personnel events (such as role transitions, leaves of absence, and offboarding) occur. All provisioning events are sent to the appropriate people, actions are logged, and reports are available for historical and audit purposes.
Assurance
The assurance features within Permission Assist help you verify the integrity and reliability of your IAM processes so you know they are working as intended. The following list provides more information about some ways Permission Assist can help you increase assurance and provide credible evidence of the process.
Verifying security data
Both internal and external auditors will often ask for proof of completeness and accuracy. When using Permission Assist, this includes making sure your security data is accurate and that it accurately represents the data in your applications. The following sections of documentation provide you with the information you need to be prepared.
Reviewing permissions
-
Create new reviews — Permission Assist gathers all users and their permission data and organizes them for each reviewer so they can see exactly who has access to what. Current permissions can easily be compared to their role-based access model, so the reviewer can easily see whether a user is over or underprivileged.
-
Manage reviews — See the status of the review overall and track each reviewer’s progress.
Remediating access
If a user’s permissions aren’t right, reviewers can flag that user and send their permissions through a remediation process to ensure they’re handled according to your defined workflow. Changes are routed directly to the appropriate person. Pre-approval and post-verification workflows are available.
Providing proof
Various reports are provided to show completion of assurance activities. A complete audit package can also be downloaded for each review, so you can provide credible evidence of the process to internal or external auditors.