It is important to know which securable objects give access to sensitive data. For these types of securable objects, you can review the ones that give access to sensitive data:
Roles
Duties
Privileges
Users
You can use several charts to audit access to sensitive data:
Number of security objects with access to sensitive data
Number of users with access to sensitive data per organization
Number of roles per user with access to sensitive data
Reasons to give roles access to sensitive data
Each change in the access of securable objects to sensitive data is logged in the security history. You can view and analyze these events in the security history.
Note
In the flow diagram, clicking ‘Audit security history’ opens the related section in the ‘Audit security section’.