Show TOC

Component documentationMitigated Access Locate this document in the navigation structure

 

Mitigated Access allows you to manage the risks associated with access control by identifying risks, assessing the level of those risks, and assigning mitigating controls to users, roles, and profiles to mitigate access rule violations.

A risk is identified through risk analysis and cannot be mitigated unless the control has been previously defined.

The first step in defining or creating a mitigating control is to create a mitigating control ID. This ID appears in risk analysis reports. All risk IDs associated with the control must also be mitigated with this control.

Features

Use mitigating controls to:

  • Create mitigating controls that you cannot remove

  • Assign mitigating controls to users, roles, and profiles that contain a risk

  • Establish a period of time during which the control is valid

  • Specify steps to monitor conflicting actions associated with the risk

  • Create administrator, control monitors, approvers, and risk owners and assign mitigating controls to them.

You can print all search results in mitigation or export them to an Excel file. Due to screen size limitations, the printed and exported versions of the search results may contain more data fields than the screen can display.