Many installations design security maintenance request forms that are completed by the appropriate functional area, and are approved by the appropriate functional authority. The forms are then submitted to the appropriate administrator for revision of the Security File. The forms are then filed as a permanent record of the request. These forms contain all of the information necessary for the revision, including effective date, resource name and level of access required, user or profile name, and expiration date if the request is for temporary access.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|