Once upon a time, managing identities was a snap. Corporate IT infrastructure consisted of a single, hulking IBM mainframe with a relatively specialized group of back-office users who were either logged on or not. If line employees or managers had computers at all, they were used for word processing and spreadsheets, and people “networked” machines by handing floppy disks to one another.
Today even the janitor might carry a Blackberry—bringing a boon to productivity, yes, but also turning identity management into a terrific challenge for corporate executives who must assure regulators that only those who are properly authorized to access financial systems actually do.
The legitimacy of system users is inherent in Section 302 and Section 404 of Sarbanes-Oxley, which demand effective internal control over financial reporting. But you can’t have effective controls if a disgruntled former employee can log into the payroll department. Guarding... To get the full story, subscribe now.
Join the Community
Full, instant access
Single-user subscription, one year | $1,199.00
For multi-user subscriptions, call (888) 519-9200