Use Case:
Data Access Governance Initiated Data Security Enforcement and Remediation

Data Access Governance applications have integration with Identity Governance applications for the purposes of remediation of inappropriate permissions on folders containing sensitive data.

Scenario

Data Access Governance (DAG) applications initiate attestation based on an organizations corporate data sensitivity policy.

Actions

– Click for larger image –

Success Criteria

  1. End user group membership is removed for access determined as inappropriate.

IDSA Security Controls

Data Protection via Data Security Policies

Web application and data access is secured utilizing Cloud Access Security Broker (CASB) or Data Access Governance (DAG) enforcement policies.