ITGC User Access Testing
ITGC User Access Testing
to perform
https://www.linkedin.com/in/chinmaykulkarni22/
What are the
key risks?
User retains access post employment termination
https://www.linkedin.com/in/chinmaykulkarni22/
Step 1
Data Request
https://www.linkedin.com/in/chinmaykulkarni22/
Step 2
User access review
Review if a user is active
Review if the user is approved before granting
access
Review the type of account:
https://www.linkedin.com/in/chinmaykulkarni22/
Step 3
Check for other details
Review the business unit of the user to ensure
access aligns with the job function
https://www.linkedin.com/in/chinmaykulkarni22/
Step 4
Review service accounts
The biggest risk with using service account is
"Traceability issues"
Malicious activity
Service_account_16745
https://www.linkedin.com/in/chinmaykulkarni22/
Step 5
Segregation of Duties (SoD)
Review that no single person can introduce
fraudulent or malicious activity without detection
https://www.linkedin.com/in/chinmaykulkarni22/
Best Practices
Develop an onboarding template to assign user
roles, the tasks for each role and the required
access
https://www.linkedin.com/in/chinmaykulkarni22/
Connect with me
to learn more about
ITGC Testing
Data Privacy
IT Auditing
Risk Management
https://www.linkedin.com/in/chinmaykulkarni22/