Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

What is Recertification?

Recertification is the process of regularly reviewing and verifying a process that routinely assesses and confirms user access rights to ensure they align with the user's role, company their roles, corporate policies, and regulationsregulatory standards. For example, In the account validity recertification process, a responsible person (manager, supervisor, responsible party, or other designated person) checks the user’s account and decides whether this account should continue to exist. It is an essential instance, a designated authority such as a manager evaluates a user's account validity to ascertain its ongoing activation status. This crucial component of governance, risk, and compliance (GRC) programs, as it helps organizations meet programs aids organizations in meeting regulatory requirements, mitigate diminishing security risksthreats, and prevent averting data breaches. Depending Recertification frequency varies based on the industry and relevant regulations that apply to the organization, Recertification may need to be performed regularly, such as , often occurring annually or semi-annually. To effectively execute recertification, organizations must develop well-defined guidelines and processes and guarantee proper training for responsible individuals.

Recertification is necessary to ensure that only authorized personnel has access to the enterprise's data, minimize the risk for all risky accesses, and prevent potential security breaches. Recertification is not just about checking and validating unauthorized access. A company would also like to have risk management in place to prevent people from getting toxic combinations of access that could be a risk to the companynot only essential for maintaining authorized access to an organization's data but also for minimizing the likelihood of risky or unauthorized access and averting potential security breaches. It serves as a vital risk management instrument, helping to prevent individuals from obtaining harmful access combinations that could jeopardize the organization. For example, a person might get access toxic access combination might allow an individual to create a purchase order and approve the same purchase order. This is a toxic combination of access and potential company risk, which can be mitigated by Recertification.

EmpowerID provides a powerful Recertification platform that allows any organization to take a more proactive approach to rectify potential security issues before they occur. With the help of the recertification features provided by EmpowerID, organizations can automate the process of collecting data, presenting data to auditors, reviewing and verifying, and removing user access rights.

Recertification Policy & Recertification Audit

A Recertification Policy is purchase orders, posing a risk to the company. Recertification enables organizations to detect and rectify such access combinations, mitigating potential hazards and strengthening their security stance.

EmpowerID offers a robust Recertification platform, empowering organizations to proactively address potential security concerns. EmpowerID's recertification capabilities automate data collection, auditor presentation, user access rights verification, and inappropriate access removal. This streamlines the recertification process, reducing the risk of unauthorized access and ensuring regulatory compliance. Additionally, EmpowerID's platform boasts advanced reporting and analytics features, providing organizations with valuable insights into their access management practices and fostering data-driven decision-making. Leveraging EmpowerID's Recertification platform, organizations can bolster their security posture, protect sensitive data from breaches, and operate confidently.

Recertification Policies and Access Recertification Audits

What are Recertification policies?

Recertification policies comprise a set of guidelines and procedures that an organization establishes to ensure that access rights are reviewed and verified to align with the user's roleorganizations implement to regularly review and verify user access rights in accordance with user roles, company policies, and regulations. The policies outline which users and what access rights will be reviewed. With a Recertification Policy in EmpowerID, you can define

  • Type of access to recertify.

  • Default

    regulatory requirements. In EmpowerID's Recertification platform, you can tailor various policy aspects, including access type, default decisions for unattended recertification requests

    .
  • Who/What to recertify?

  • Which data/access to recertify?

  • We can create recertification policies of different types in the EmpowerID system, which are reusable. For example, we should certify an external partner identity and a member of certain , and who or what needs recertification. EmpowerID allows creating different types of reusable recertification policies, such as certifying an external partner's identity or reviewing high-risk management roles in during an audit. These items can be specified in one or more recertification policies. Later these policies can be attached to an Audit. The review of linked to an audit for implementation.

    Tip

    For more information on how Recertification policy types work in EmpowerID, see Recertification Policy Types.

    What are Access Recertification Audits?

    Access Recertification Audits involve reviewing user access rights to see if they are proper and correspond to the ensure appropriateness and compliance with an organization's internal rules policies and compliance standards is known as an Access Recertification Audit. The Recertification is often implemented as an Audit that collects regulatory standards. Audits collect data based on the configurations in associated recertification policies. EmpowerID collects data about user access rights, including permissions to access sensitive data or systems, and routes the information for review to authorized Auditors such as managers, role owners, or data owners.The auditors can identify and address any , which are then sent to authorized auditors, such as managers or data owners, for review and validation. Auditors can identify and resolve discrepancies or issues with user access rights and ensure that access rights comply during an audit, ensuring compliance with company policies, regulations, and industry standards. Each access EmpowerID generates a business request item which is items for each access, which are presented as a task tasks to auditors to help recertify discrepancies and provide access revocation. The data generated in an audit about access are snapshots, meaning the data represents the state it was captured, which will not change. EmpowerID maintains data is a snapshot representing the captured state, with EmpowerID maintaining an audit trail of these access snapshots and the related decisions made concerning the access.

    The recertification policy defines the rules and procedures for reviewing access rights. In contrast, while the recertification audit is the actual review of access rights against the company policies and regulations. Since the Recertification of the access is a continuous process, EmpowerID recertification audits can be scheduled to run EmpowerID enables organizations to schedule recertification audits periodically, such as on a quarterly or , monthly basis, weekly, daily, or at willon demand. With EmpowerID's Access Recertification Audit, organizations can automate and streamline their access review process, ensuring compliance with regulatory requirements.

    Recertification Architecture and Process Flow

    This diagram describes the The following diagram illustrates EmpowerID's Recertification Architecture of EmpowerID. Detailed information about , with detailed explanations of each process is described provided below the diagram.

    Image Removed

    The first step in Recertification in EmpowerID is to create recertification policies, which are reusable definitions or rules that allow you to configure who and what types of access should be audited. These policies can be configured based on organizational rules, including the type, scope, and people. They can be used in multiple audits, saving time and effort compared to defining them each time.Image Added

    1. Define the Recertification policy

      1. Create a Recertification Policy: Create a recertification policy that defines the type of policy and enables it for audit. You can also configure what should be done if any access recertification is unattended by the auditors.

      2. Add a Target to the Recertification Policy: Adding – Configure the policy with a target to a recertification policy configures specify who or what will be recertified. Recertification policies can target multiple resources and objects, such as a specific location, group, or resource type.

      3. Add Item Type Scope (Data) to the Recertification Policy: The Item Type Scope in a Recertification Policy allows users to configure what data will be collected for Recertification. The item scope enables – Configure the policy to specify the data to be collected with item type scopes. Item scopes enable users to tailor the recertification process to meet their specific needs, such as specifying the collection of data only for a person's access to a group as a member.

    2. Once the policy is defined, Audits will be created by the user. An audit is an end-to-end recertification implementation, meaning the data is collected and certified during an audit.

      Create Recertification Audit: In EmpowerID, an audit is a logically named user-defined object for identifying or grouping business requests and running the Recertification policies that generate them. EmpowerID recertification audits can be scheduled to run periodically, such as on a quarterly or monthly basis, weekly, daily, or at will.

      Create and define an audit

      1. Create Recertification Audit – Audits are needed to trigger Recertification policies.

      2. Add Recertification Policy to Recertification Audit: An audit can have multiple recertification policies enabling you to granularly configure to collect different types of access data in a single audit.  – After creating the audit, you link it to one or more Recertification policies.

    3. Run the audit

      1. The EmpowerID recertification engine

      runs
      1. executes the audit

      on provided schedule
      1. according to the scheduled timeline, automatically collecting access data and

      saving
      1. preserving it as snapshots,

      meaning
      1. which represent the state of the data

      represents the state it was captured, which will not change.
      1. The at the time of capture and remain unchanged.

      2. This collected data is used to create generate Business Requests and Their their associated items. In EmpowerID, each access recertification is represented as a Business Request Item or , an automatically generated task request which is presented to auditors as a Business requestRequest. The Attestation Policy Compiler, a background job Attestion Policy Compiler does the collection of data and generation of business requests. You can , manages data collection and business request generation. To verify the audit's effectiveness in generating requests, follow the instructions in "Verify Business Requests are Generated to see if the audit generates the requests. ."

      3. Auditors and responsible managers provide make decisions to Certify, Revoke, and other actions in the business requests. Instruction to Provide Business Requests Decisions These business requests contains , such as certifying or revoking access, in response to business requests. Instructions for providing decisions on Business Requests can be found in "Provide Business Request Decisions." These business requests contain details about the access for the person that needs to be certified for each individual.

      4. Once the After auditors provide the make decisions on the business requestrequests, the fulfillment workflow picks the decision and fulfills itprocesses these decisions. The background job Business Request Fulfillment does the fulfillment background job completes this task based on the provided business decisions.

    Div
    stylefloat:left; position:fixed;
    idarticleNav

    IN THIS ARTICLE

    Table of Contents
    maxLevel4
    minLevel2
    stylenone
    printablefalse
    Macrosuite divider macro
    dividerWidth100
    dividerTypetext
    emoji{"id":"smile","name":"Smiling Face with Open Mouth and Smiling Eyes","short_names":["smile"],"colons":":smile:","emoticons":["C:","c:",":D",":-D"],"unified":"1f604","skin":null,"native":"😄"}
    textColor#000000
    dividerWeight3
    labelPositionmiddle
    textAlignmentcenter
    iconColor#0052CC
    iconSizemedium
    fontSizemedium
    textRelated Docs
    emojiEnabledfalse
    dividerColor#DFE1E6
    dividerIconbootstrap/CloudsFill

    Recertification Policy Types

    Insert excerpt
    IL:External Stylesheet
    IL:External Stylesheet
    nopaneltrue