itauditsecurity.wordpress.com
How to Audit User Access
When checking system access, make sure you look at all the different items that affect the user’s access. For example, the user might need one or more of the following: Application ID Applica…