Identity and Access Management
- We implement access control based on the principles of “least-privilege” and “need-to-know”. There is a separation of duties for granting access and approving access to systems and data.
- Employees with access to production environment receive necessary training to their role. We govern a unique user ID per employee created and assigned to ensure a unique user ID is used to access any system that collects, stores or processes data.
- We logs records of all activity on company resources and monitor and review employee and vendor behavior to safeguard against suspicious/ unauthorized activity.
- We require our internal employees to use MFA and SSO to login into all company resources.
If you can’t find what you need or need further assistance, contact us.
Did you find this article helpful? Yes No