You are viewing an earlier version of the admin guide. For the latest version, please visit EmpowerID Admin Guide v7.211.0.0.

View Risk Violations

If, when calculating the risk rules for a local risk, EmpowerID discovers users violating the rules (they have one or more risk functions defined by the local risk), it flags the violations and sends them to risk owners for approval, mitigation, or remediation.  Risk violations are logged and tracked, with risk owners alerted of violations pending their decision. Risk owners can analyze all aspects of how the risky access was obtained and decide to allow the risk and add optional mitigating controls or opt for the violation to be corrected and the risky access removed.

EmpowerID does not notify risk owners when premitigated violation occurs. A record of the violation and the reason for the pre mitigation are kept for review and audit purposes.

How to view risk violations

  1. On the navbar, expand Compliance and click Violations.

  2. You can identify and search for any potential risks associated with the violations.

    • Discovered: This is the date and time when the violation was discovered.

    • Mitigation Status: This refers to the current status of the mitigation. It could be mitigated, rejected, or still not mitigated.

    • Violation: Refers to the specific breach or non-compliance that is occurring, causing the need for mitigation measures.

    • Risk Violator: This pertains to the person who violated the rule. EmpowerID identifies the person violating the rule, regardless of how they received the violating functions. If numerous individuals belong to a role that has the function, EmpowerID will flag each person in the role as a violator to provide a complete picture of the magnitude of the risk. Risk owners can view the exact assignment point that caused the person to be in violation.

    • Risk: This refers to the potential risk that is associated with the breach or non-compliance with policies.

    • Risk Type: Type of the risk, e.g., Segregation Of Duties, Critical Access

    • Mitigator: The person who was responsible for mitigating the risk.

    • Mitigation Expires On: After this date, the mitigation will expire and will need to be re-mitigated.


      image-20240123-170759.png



  3. Click on any violation link to view more information about the violator and the violation. For example, clicking on the violation link for the specific record in question will provide more details.


    image-20240124-072024.png

     

  4. Clicking the Violation link for a violation record directs you to the Local Risk Details page for that violation. The page has a number of accordions with more details about the details.

    Â