Back to Blog

User Access Complexity

By Finosec

November 19, 2021

Get notified on new insights from Finosec now!

Be the first to know about new Finosec blogs to grow your knowledge of the cybersecurity governance industry today!

Earlier we discussed the frequency of user access reviews and how often they should be completed. You can read that blog here. It seems that there is a direct correlation between user access review frequency and the difficulties associated with those reviews. A highly manual process will inherently prohibit increased frequency due to increased time requirements. President and CEO Zach Duke talks about the challenges these reviews pose to you and/or your staff, and some next steps on how to make that process a little simpler. Take a couple minutes to watch the video below.

It seems obvious that you will see an increase in frequency and efficiency by decreasing the time associated with completing a user access review. But that is often easier said than done. A vital question you must ask yourself as you conduct these reviews is: how do you validate access to these high risk functions? By using this as the starting point, locating efficiencies can move outward from this question. This will determine how much time it takes to complete the review as well as how manual the process is. Complexity is intrinsically wrapped up in the aforementioned validation, and simplification will have a compounding effect on your processes. Printing off pages and pages of documents to be reviewed with a highlighter is a highly manual process that lends itself to unrealistic time expectations and a higher possibility of mistakes and oversights. But it doesn’t have to be that way. There is a system that can automatically provide documentation and reporting that shows you the changes that have taken place since your last review. Because of the automation and decreased complexity, this also frees up your time to complete these reviews more frequently and, in turn, increase the cybersecurity strength of your institution. 

We appreciate your feedback in our last survey surrounding user access reviews! We will be releasing another survey after Thanksgiving, so be sure to sign up for Finosec Academy and keep an eye out for its release. We hope to see you there!

More from Finosec

Why You Need to Know Every System for Every Employee

Why You Need to Know Every System for Every Employee

Are you confident that your bank has clear and thorough visibility to every employee’s physical and digital access to systems? If you’re like most banks we work with, the answer to this question is “no”. There are many challenges that make tracking employee access...

The Hidden Risks of Shadow IT: Why Community Banks Need a Detailed System Inventory

The Hidden Risks of Shadow IT: Why Community Banks Need a Detailed System Inventory

In the world of community banking, the landscape of information security and cyber risk management has dramatically evolved. Gone are the days when all servers were in-house, and every application installation involved the IT department. Today, it’s easier than ever for a Compliance Officer to sign off on a new software tool to manage Reg DD challenges or for a Loan Officer to adopt a cloud solution to improve customer acceptance rates.

My Epiphany of AI During a Session With My Therapist

My Epiphany of AI During a Session With My Therapist

For over a year now, every Tuesday, the Finosec team has been holding a meeting to discuss how we are leveraging AI personally, at work, and in our platform. These weekly meetings have consistently focused on sharing the impact of AI for each of us personally and the...

Integrating FFIEC Authentication Guidance: A Blueprint for Your Next Exam With Insights from Recent Regulatory Actions

Integrating FFIEC Authentication Guidance: A Blueprint for Your Next Exam With Insights from Recent Regulatory Actions

The Federal Financial Institutions Examination Council (FFIEC) Authentication Guidance update in August 2021 has marked a significant step towards enhancing authentication and security access measures within financial institutions. This update expanded upon previous handbooks from 2005 and 2011, emphasizing a broader scope that now includes employees, third-party vendors, and system-to-system communications via APIs.

Talk To An Expert Now
Talk To An Expert Now 770.268.2765