Audit access to sensitive data

Prev Next

It is important to know which securable objects give access to sensitive data. For these types of securable objects, you can review the ones that give access to sensitive data:

  • Roles

  • Duties

  • Privileges

  • Users

You can use several charts to audit access to sensitive data:

  • Number of security objects with access to sensitive data

  • Number of users with access to sensitive data per organization

  • Number of roles per user with access to sensitive data

  • Reasons to give roles access to sensitive data

Each change in the access of securable objects to sensitive data is logged in the security history. You can view and analyze these events in the security history.

Note

In the flow diagram, clicking ‘Audit security history’ opens the related section in the ‘Audit security section’.

Flow diagram