As a part of the Access Management process, it is critical to perform a regular review of the accesses to ensure they
are appropriate. Obsolete or unwanted accesses must be removed. Logging and tracking modifications to accesses is
critical, as it can be reviewed to ensure that granted accesses are used only as intended. Tracking access changes also
helps to protect from security gaps and risks. Events such as detection of unauthorized access, unusual application
activity, and excessive incorrect login attempts should be evaluated for security breaches.
|