User Access Control

New Vulnerabilities are discovered every day; over 20,000 were discovered in 2017 in various OSs, applications, databases, etc.

A process of identifying and qualifying security vulnerabilities in a company’s network and systems provides a risk score for each database and/or file-share folder.

User Access Control and Entitlement Reports (permission visibility) should be reviewed on a monthly basis. Most companies have stale users in AD who have left the company years ago still showing as active.