Dec. 4, 2023, 6:05 p.m. | /u/SolidBorder810

cybersecurity www.reddit.com

My company has a terrible system for IAM. I’m wondering if anyone knows best practices for going about this, and I’ll try to explain it best I can… so basically Sysadmins grant access rights to different applications, but I’m responsible for managing and accounting of access rights. Currently we use a large excel pivot table to manage access for all users to different applications. A template is created for each user any time a change is made. This system seems …

access access management access rights accounting applications best practices cybersecurity excel grant iam identity identity and access identity and access management large management pivot practices responsible rights system try

Sr Cyber Threat Hunt Researcher

@ Peraton | Beltsville, MD, United States

Lead Consultant, Hydrogeologist

@ WSP | Chattanooga, TN, United States

Senior Security Engineer - Netskope/Proofpoint

@ Sainsbury's | London, London, United Kingdom

Senior Technical Analyst-Network Security

@ Computacenter | Bengaluru Bengaluru (Bengaluru, IN, 560025

Senior DevSecOps Engineer - Clearance Required

@ Logistics Management Institute | Remote, United States

Software Test Automation Manager - Cloud Security

@ Tenable | Israel - Office - CS