Audit trail

How do you know and how can you check who has access to which systems? And how do you know who actually uses which form of access? The Audit trail answers these questions.

[Clarity when it comes to access rights]

What is an Audit trail?

An Audit trail, also referred to as an audit log, records which user has access to certain systems and when this access occurs. With the automated Audit trail in combination with the Auditor Dashboard of Topicus KeyHub, you provide the necessary information for an audit in only minutes.

01.2 - IDENTITY AND ACCESS MANAGEMENT - CONTENT - HALF - 450 x 477-1

 

"You won't start to see it until you understand it."

Request a FREE Demo and discover the power of KeyHub.
[Check access rights on a regular basis]

Controlling access

The Auditor Dashboard gives a CISO or other responsibilities for usable insights into security about the way in which teams have and use their access to systems. The group managers are responsible for allocating and revoking rights.

They can also regularly check the use of these rights. Topicus KeyHub automatically sends group managers a message if the access rights of users needs to be checked. The CISO checks whether the scheduled controls are carried out on time by the group managers.

01.3 - IDENTITY AND ACCESS MANAGEMENT - CONTENT - FULL - 1281 x 488-1
[Automatic insight into access]

Auditor Dashboard

Everything that has to do with access to systems is recorded in an automated Audit trial. Allocating access rights, revoking these rights and the use of the access by users is recorded. This information is clearly presented so that auditors have insight into the security of groups.

In KeyHub, auditors have access to a real-time authorisation matrix. This includes the description of who belongs to which group and whether groups meet the conditions of your security policy. Auditors also have insight into all of the Audit trails.

[Insight into the standard]

Auditor Dashboard and compliance

Providing insight into the access rights is a key component of audits concerning online security. In order to comply with the security standards ISO 27001, NEN 7510, SOC 2, ISAE 3402, and the GDPR, offering good insight into the access rights is indispensable.

With KeyHub's Auditor Dashboard, the most important information for an audit is always available in real-time. This is how the auditor can show that you are in control of the digital security of your organisation.

"You won't start to see it until you understand it."

Request a FREE Demo and discover the power of KeyHub.