@lorettodave Says “...Today, managers approve access requests, and IT implements them without knowing *why* a user needs access. The approach outlined here would help transfer risk ownership back to data/asset owners (and away from IT/InfoSec)...”
https://twitter.com/swiftonsecurity/status/954442160333557762
No comments:
Post a Comment