Identity Governance (IG) Myth #4: IG is needed only if your industry has mandatory regulatory compliances

Identity Governance (IG) Myth #4: IG is needed only if your industry has mandatory regulatory compliances

Identity Governance (IG) is a framework that helps to render the vital security policies and practices in place for your organization. Compliance regulations are only mandated by governments to increase data security and privacy. So IG, when used in the right way can in fact act as a catalyst for achieving compliance with security regulations.

 

The ADManager Plus solution: 

  • Pre-built reports necessary for compliance audits for security regulations like GDPR, HIPAA, PCI, etc.

  • Approval-based workflow to streamline and monitor the critical tasks.

 How to schedule reports required for compliance regulations?

  • ADManager Plus offers one-click inbuilt reports on user logon activities, folder access permissions, GPOs, password status, group memberships and more that cater to various security regulations.

  • Audit trails of technicians who are delegated tasks like user provisioning, password reset,etc that require access to sensitive data. 

  1. Navigate to Reports > Schedule Reports > Create Schedule.

  2. Enter a suitable Name and Description for the schedule.

  3. Choose the Domain and the Reports you wish to schedule. Click on the edit icon next to the chosen report to select the attributes or columns you need in the report. ADManager Plus offers various custom made reports for various compliance regulations like PCI, HIPAA, GDPR, etc which includes

  4. You can set the frequency of the report generation to be Hourly, Daily, Weekly, Monthly or a Custom time period. You can also set the time of the day for the report to be generated.

  5. Likewise, you can choose the format (HTML, CSVDE, CSV, PDF or XLSX) in which you want the report to be delivered in the Schedule Report Format section.

  6. Enter the email address of the IT managers or security team heads, to whom the report needs to be sent to.

  7.  Click Save.

  

How to establish a workflow for critical tasks dealing with sensitive data? 

  1. Navigate to Workflow > Configuration > Business workflow.

  2. Enter a suitable Name and Description for the workflow.

  3. You can customize the different approval levels for your workflow. For example, if you want your workflow to consist of requesters, (2) reviewers and (2) approvers, enable the checkbox against reviewers and approvers. Then select the number of reviewers and approvers as 2 each. You can also add the users you wish to add as reviewers or approvers by clicking the Configure button in the respective section. This page will give you more information about configuring workflow technicians.
    Note : You can customize the workflow to associate a particular action or task to a specific reviewer, approver or executor and set notifications to the technicians. Learn more about this here.

  4. Click Create Workflow to finish.

  

Tune in next week to bust another myth on Identity Governance! If you missed out on the rest of the series, click here.

 

Cheers,

Team ADManager Plus 


                New to ADSelfService Plus?