Use Case - Data Access Governance Initiated Data Security Enforcement and Remediation
Recommended Implementation Details
Scenario Data Access Governance (DAG) applications initiate attestation based on an organizations corporate data sensitivity policy
Description Data Access Governance applications have integration with Identity Governance applications for the purposes of remediation of inappropriate permissions on folders containing sensitive data.
IDSA Security Controls
Success Criteria
  1. End user group membership is removed for access determined as inappropriate