Data Access Governance Initiated Data Security Enforcement and Remediation
Data Access Governance applications have integration with Identity Governance applications for the purposes of remediation of inappropriate permissions on folders containing sensitive data.
Data Access Governance (DAG) applications initiate attestation based on an organizations corporate data sensitivity policy.
– Click for larger image –
- End user group membership is removed for access determined as inappropriate.
IDSA Security Controls
Web application and data access is secured utilizing Cloud Access Security Broker (CASB) or Data Access Governance (DAG) enforcement policies.