Integrated Risk Management
Through the application of technology and automation, we'll help you manage your risks efficiently and effectively across the entire enterprise.
Identity and Access Managaement
We'll help you ensure everybody within your organisation has access to the right systems and data, for the right reasons, and at the right time.
Cyber & Application Security
Our experts will uncover security weaknesses within your security design and business-critical applications. Helping you protect your organisation from both internal and external threats.
About us
A group of passionate individuals with a shared purpose to help the world's leading companies embrace best practices for GRC and risk management.
Partners
Turnkey's strategic partner network consists of selected organisations that complement our capabilities.
Corporate Social Responsibility
We are committed to being agents for change through our Climate Action Plan, championing diversity in our workplaces, and more.
Get in touch
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Careers
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Webinars & eBooks
All of Turnkey's webinars, guides and other insights available in one place.
Blogs
Read the latest insights from our experts on GRC and risk management, covering the latest industry topics.
Press Coverage
See all the publications where Turnkey, our experts and our successes have been noted.
Key events
See the key industry conferences on GRC, SAP security and risk management which we are attending.
Case Studies
Client satisfaction is of the utmost importance to us, and we strive to constantly deliver above expectations, going the extra mile at every opportunity.
FAQs
We've put together a comprehensive list of frequently asked questions - along with our responses - to the most common GRC and SAP security issues.
21 May 2013

Top 5 Customer Concerns Around Managing Access Risk - Part 2

As part of my blog on the top five concerns around managing access risk, last week we looked at concerns around improper systems access leading to loss from fraud or error. This week I discuss how to best manage emergency access to systems.

Emergency access to systems, without the proper controls and auditability

Emergency access to production systems is a fact of life. For example, performance troubleshooting or configuring a setting which cannot be transported, such as number ranges, or debug access.

A requirement always exists to meet immediate business needs when a role cannot be developed in time.

GRC Emergency User Access provides a balance between business requirements and the need to exercise internal control. Typical emergency processes are frail and do not stand up to audit scrutiny (e.g. no audit trail, approval occurs after the fact). EUA enforces a robust and auditable emergency access process.

This is very quick to implement. We recently implemented Emergency Access at a client in two weeks. Feedback from client was: 

  • One of the smoothest IT implementations they had seen
  • Easy to use
  • Will be of great benefit to the support team.