< All Topics
Print

Access Activity Risks

Perform the following steps to review Access Risk:

  • As access risk is primarily associated with sensitive data (e.g., Confidential or Restricted), we recommend excluding non-sensitive files (e.g., Internal or Public) as they typically do not pose a material risk concern. This also assists in having a stronger focus to more efficiently assess key access risks.

Next, select whatever account (e.g., user, title, group or departmental) or folder or file you’re looking to assess.

access risk user filter dash
access risk user filter dash

access risk user filter file inv

In the example above, the key access risk identifies the following risk factors for User Account [email protected]:

  • Held the position of Engineer with R&D department
  • The 385 files are in the record types Safety, Incident Report, Meeting Report, Agreements & Contracts, Proposals, and Audits & Assessments
  • The associated files contain Email Addresses