Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

If, when calculating the risk rules for a local risk, EmpowerID discovers users violating the rules (they have one or more risk functions defined by the local risk), it flags the violations and sends them to risk owners for approval, mitigation, or remediation.  Risk violations are logged and tracked, with risk owners alerted of violations pending their decision. Risk owners can analyze all aspects of how the risky access was obtained and decide to allow the risk and add optional mitigating controls or opt for the violation to be corrected and the risky access removed.

Info

EmpowerID does not notify risk owners when premitigated violation occuroccurs. A record of the violation and the reason for the premitigation pre mitigation are kept for review and audit purposes.

How to view risk violations

  1. On the navbar, expand Compliance and click

...

  1. Violations.

  2. You can identify and search for any potential risks associated with the violations.

...

    • Discovered: This is the date and time when the violation was discovered.

    • Mitigation Status: This refers to the current status

...

    • of the mitigation. It could be mitigated, rejected, or still not mitigated.

    • Violation: Refers to the specific breach or non-compliance that is occurring, causing the need for mitigation measures.

    • Risk Violator: This pertains to the person who violated the rule. EmpowerID identifies the person violating the rule, regardless of how they received the violating functions.

...

    • If numerous individuals belong to a role that has the function, EmpowerID will flag each person in the role as a violator to

...

    • provide a

...

    • complete picture of the magnitude of the risk. Risk owners can view the exact assignment point that caused the person to be in violation.

...

The violation

...

    • Risk

...

Whether the violation is still active

...

When the risk was modified

...

The risk migitator, if any

...

    • : This refers to the potential risk that is associated with the breach or non-compliance with policies.

    • Risk Type: Type of the risk, e.g., Segregation Of Duties, Critical Access

    • Mitigator: The person who was responsible for mitigating the risk.

    • Mitigation Expires On: After this date, the mitigation will expire and will need to be re-mitigated.

      image-20240123-170759.pngImage Added


  1. Click on any violation link to view more information about the

...

  1. violator and the

...

  1. violation. For example,

...

  1. clicking on the violation link for the specific record in question will provide more details.

...


  1. image-20240124-072024.pngImage Added

  2. Clicking the Violation link for a violation record directs you to the Local Risk Details page for that violation. The page has a number of accordions with more details about the details.

...

  1. image-20240124-072335.pngImage Added

Insert excerpt
IL:External Stylesheet
IL:External Stylesheet
nopaneltrue