Banner

Key Insights Blog

Read the latest insights from our experts on GRC and risk management.

Top 5 Customer Concerns Around Managing Access Risk - Part 2

Posted by Ed Davis on 21 May 2013
Ed Davis

As part of my blog on the top five concerns around managing access risk, last week we looked at concerns around improper systems access leading to loss from fraud or error. This week I discuss how to best manage emergency access to systems.

Emergency access to systems, without the proper controls and auditability

Emergency access to production systems is a fact of life. For example, performance troubleshooting or configuring a setting which cannot be transported, such as number ranges, or debug access.

A requirement always exists to meet immediate business needs when a role cannot be developed in time.

GRC Emergency User Access provides a balance between business requirements and the need to exercise internal control. Typical emergency processes are frail and do not stand up to audit scrutiny (e.g. no audit trail, approval occurs after the fact). EUA enforces a robust and auditable emergency access process.

This is very quick to implement. We recently implemented Emergency Access at a client in two weeks. Feedback from client was: 

  • One of the smoothest IT implementations they had seen
  • Easy to use
  • Will be of great benefit to the support team.

We would love to hear your thoughts. Please leave a comment.

We can let you know when we have a new blog - subscribe here

* We respect your privacy and personal data. By submitting your details and downloading our document you are accepting Turnkey Consulting's privacy policy which can be found here.

Turnkey_KeyviewsPage-1

For a 3 minute Introduction to Turnkey Consulting, Download Our 18 Page Flipboard Guide

Download