Identity & Access · IA-Q02

Question

Are accounts created, modified, and revoked through a documented, authorized JML workflow?

Why This Matters

Broken JML creates dormant accounts and privilege creep. Automating JML reduces risk and effort while improving auditability.

Maturity

How to Level Up

| From → To | Actions | |—|—| |0 → 2| Publish JML SOP; define approvers; map systems and timing points.| |2 → 3| Integrate HRIS events to IdP/IAM; same-day disable on termination.| |3 → 4| Expand to major apps; enforce SoD; monitor JML SLAs.| |4 → 5| Add risk scoring, step-up approvals, and exception analytics.|

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

Common Pitfalls

Compliance Mapping