Skip main navigation

Monitoring, Access Reviews, and Reporting

In this video, you will learn about monitoring processes, access reviews, and reporting processes.

In this video, you will learn about monitoring processes, access reviews, and reporting processes.

Once you have watched the video, read the recap below:

  • We need to monitor all processes. We will want to know what to check for, who executes the checks, how often the checks are completed, and how to assess vulnerabilities.
  • Access reviews are recommended and can be a point-in-time assessment to review accounts that are dormant, disabled, or similar, and review their privileges to see if they are correct and appropriate.
  • Reporting processes should consider what is being reported, how and why certain data is reported, and whether there are any compliance requirements. In addition, how often reports occur, the format it is generated and any escalation processes will need to be considered.
This article is from the free online

Cyber Security Foundations: Identity and Access Management

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now