Use security requests to register any required changes in the security setup.
You can create a security request in these ways:
As a system user, you can create a security request from any page.
In Security and Compliance Studio, you can create security requests from the Security management workspace.
Usually, a security request is approved by the security manager and implemented by the security administrator.