Companies have different requirements that they need for regulating internal and external identities' access to company resources. On the one hand, rule checks are used for locating rule violations and on the other hand, to prevent them. By using these rules, you can demonstrate compliance with legislated regulations such as the Sarbanes-Oxley Act (SOX). The following demands are made on compliance:
-
Compliance rules define what an identity is entitled to do or not do. For example, an identity may not have both entitlements A and B at the same time.
-
Company policies are very flexible, and can be defined for any company resources you are managing with Manager. For example, a policy might only allow identities from a certain department to own a certain entitlement.
-
Each item that an identity can access, can be given a risk value. A risk index can be calculated for identities, accounts, organization, roles, and for the groups of resources available for request. You can then use the risk indexes to help prioritize your compliance activities.
Some rules are preventative. For example, a request will not be processed if it violates the rules, unless exception approval is explicitly granted and an approver allows it. Compliance rules (if appropriate) and company policies are run on a regular schedule. and violations appear in the identity’s Web Portal to be dealt with there. Company policies can contribute to mitigation control by reducing risk. For example, if risks are posed by identities running processes outside the One Identity Manager solution and causing violations. Reports and dashboards provide you with comprehensive compliance information
Detailed information about this topic
You can display location rule violations.
To display rule violations
-
In the menu bar, click Responsibilities > Auditing.
-
On the Auditing page, click Locations.
-
On the Auditing - Location page, click the location whose rule violations you want to display.
-
In the details pane, click Show details.
-
On the overview page, click Compliance.
This opens the Compliance - <location name> page (see Compliance – Location (page description)).
Related topics
You can display location risk indexes.
NOTE: For more detailed information about risk assessment, see the One Identity Manager Risk Assessment Administration Guide.
To display a cost center's risk index
-
In the menu bar, click Responsibilities > Auditing.
-
On the Auditing page, click Locations.
-
On the Auditing - Location page, click the location whose risk index you want to display.
-
In the details pane, click Show details.
-
On the overview page, click Risk.
This opens the Risk - <location name> page (see Risk – Location (page description)).
-
(Optional) To show which attributes and assignments contribute to the calculated risk index, click View risk functions.
Related topics
The Web Portal allows you to display historical data of locations.
To do this, you have the following options:
Table 44: Historical data
Events |
Shows all events relating to the location, either on a timeline or in a table (see Displaying my locations' history). |
Status overview |
This shows you an overview of all assignments. It also shows how long each change was valid for. Use the status overview to track when changes were made and by whom. This way, you not only see the initial and current status but you also see all the steps in between (see Displaying the status overview of my locations). |
Status comparison |
You can select a date and display all the changes made from then until now. This also shows you what the value of the property was at the selected point in time and what the value is now (see Comparing statuses of my locations). |