Governance Risk dashboard

Governance Risk dashboard allows administrators to gain better insights into currently open violations and also enables them to remediate the violations taking quick actions using an interactive dashboard.

Overview

The Governance Risk Dashboard provides the administrators with interactive tools to view the count for all violations, risky users, and risky applications. In addition, it also enables the administrators to perform quick remediation actions with a single click, directly through the dashboard.

The dashboard has graphics (donut charts, bar graphs) that help in quick visualization of the violations and risks in the system, categorized into High, Medium, and Low risks. Each graphic has a legend that explains the contents. The graphics are scalable, and can be zoomed in or out for better visibility.

In case of some violations, the graphic has a "recommended action" section that the administrators can use to perform the remediation actions specific to the violation.

As an administrator, you can see more detailed information about the violations by clicking the View more link. You are directed to a policy list page that displays all the violated policies with the risk score and number of violations. You can filter the violations based on risk score filter.

Search option enables you to search for any specific policy.

When you click the policy name, the violation list page is displayed. It shows the details of the user, account, application, entitlement and risk score along with the risk severity. The violation list has its own donut chart. Similar to the policy list, you can also filter the violations list and use the search option.

For risky applications, clicking the View more link takes you to the top risky applications page. It shows the risky applications along with violation details. The violations are updated as per the changes made in the policy editor.

Using the dashboard

Table 1. Governance Risk Dashboard
Violation Cause of violation Remediation actions for violation
Account is orphan
  • After service reconciliation, the account is not adopted
  • In Manage users → Manage account, the account is selected as Orphan
Mitigation options in the dashboard:
  • Delete account
  • Suspend account
Other remediation actions:
  • Go to Delete person and clear the Delete account check box
  • Delete the account
  • Delete the service
  • Delete the person
  • Assign account to a person
  • Go to Adoption Policy and create user- recon service
Person is suspended, but has one or more active account(s)
  • In Mange users → Suspend person, the check box for Delete accounts is clear.
  • The Person is already suspended, but in Accounts, the Restore accounts check box is selected.
  • User is suspended and the account is inactive , but only account is restored.
  • In the HR feed person service, Use workflow is not selected, but the existing person is modified and suspended.
  • Make the account as inactive
  • Delete Person
  • Delete account
  • Delete Service
  • Restore the person
  • Make the account as Orphan (manually)
  • Change the owner of the active account from inactive user to active user in the system
  • Change the end point and run a recon
Recertification was approved by self
  • Campaign recertification for user entitlement was approved by self for role based access
  • Campaign recertification for user entitlement was approved by self for group based access
  • Campaign recertification for user entitlement was approved by self for parent-child access
  • Campaign recertification for user entitlement was approved by self for custom parent-child access
  • User manager is reviewer, and the recertification request for user manager was approved by the same user manager
  • Delete the service
  • Delete access
  • Remove access
  • Delete account
  • Initiate the campaign and approve by user manager for same accesses
  • Delete user
  • Remove role membership for user
Recertification was approved by someone that no longer exists Recertification was approved by a user that no longer exists in the system
  • Campaign recertification for user entitlement was approved by approver who got deleted for role-based access.
  • Campaign recertification for user entitlement was approved by approver who got deleted for group-based access
  • Campaign recertification for user entitlement was approved by approver who got deleted for parent-child access
  • Campaign recertification for user entitlement was approved by approver who got deleted for custom parent-child access
  • User manager is reviewer, and the recertification request for user was approved by the user manager and got deleted or no longer exist.
  • Remove role membership
  • Remove access from account
  • Another user approves the recertification request
  • Delete account
  • Delete user
  • Delete service
Account is non-compliant
  • Provisioning policy is set as automatic
  • Person is modified
  • Policy is modified
  • Account is modified
Mitigation options in Dashboard:
  • Delete account
  • Suspend account
Other remediation actions:
  • Take the corrective action taken on account to make it compliant ( for example, add the mandatory accesses)
  • Delete service
  • Delete account
  • Sake the required changes to the endpoint and run a recon
  • Modify the policy to remove mandatory access
Recertification is overdue Access is not certified for 3 months. This is applicable for campaign with 3 months or more duration.
  • Another campaign runs for same service and they are re-certified
  • Delete account
  • Delete service
  • Delete person
  • Remove role
  • Remove access
Account is dormant
  • User does not login for more than 90 days to endpoint using service-based accounts
  • User does not login for more than 90 days to console/ISC using itim account
Mitigation options in Dashboard:
  • Delete account
  • Suspend account
Other remediation actions:
  • Log in as the user to endpoint
  • Log in as the user to console or ISC
  • Change lastaccessdate value in LDAP
  • Delete account
  • Delete service
  • Delete user
Account has sensitive access
  • Account has one sensitive access (one violation is flagged)
  • Account has multiple sensitive accesses (2 violations are flagged)
  • User with sensitive access is added to risky user
  • Entitlements are added to risky entitlements
  • If an orphan account has sensitive access and it is then adopted by a person, it is flagged as sensitive
  • Risky applications are flagged as risky violations
  • Remove sensitive access from account from ISC
  • Remove account from sensitive access from console
  • Assign mitigation

    When you click the Assign mitigation link, the already assigned mitigation is de-selected.

    Note that you can assign multiple mitigations using the Risky user pop-up window.

  • Delete user
  • Delete account

    Delete Service

Separation of Duty Access violates SoD constraints
  • Remove access from account
  • Assign mitigation

    When you click the Assign mitigation link, the already assigned mitigation is de-selected.

    Note that you can assign multiple mitigations using the Risky user pop-up window.

  • Delete user
  • Delete account

    Delete Service