Use this feature to identify individual roles and profiles that pose an access risk to your enterprise. For example, any person who has the role of master database administrator is a risk to your enterprise. Verify that an employee assigned to this role meets the authorization requirements for your enterprise. Make sure that you designate the role as a critical role.
If your system uses profiles, you may have defined profiles that pose an access risk. Make sure that you designate each one as a critical profile.