Acess Management: Process Management by IT Training Zone

video locked

About the Lecture

The lecture Acess Management: Process Management by IT Training Zone is from the course ITIL® OSA - Operational Support and Analysis . It contains the following chapters:

  • Lesson Contents
  • Outputs, Interfaces
  • Information Management
  • CSFs and KPIs
  • Challenges, Risks

Included Quiz Questions

  1. A request by a member of a technical support team member to increase a user’s access to prevent the user getting an error message
  2. An RFC
  3. A Service Request
  4. A request via Human Resources or a business manager
  1. Service Acceptance Criteria
  2. Information security policies
  3. SLA target times for responding to access requests
  4. Authorised requests to grant or terminate access rights
  1. Security Policies
  2. Provision of access to IT services in line with information security policies
  3. Access Management records
  4. History of access denied and the reasons
  1. Strategy Management will decide whether some Access Management should be centralised or devolved
  2. Demand Management limits the volume of requests for access to a level that can be handled by the resources provided within the SLA target
  3. Neither
  1. Service Level Management: This process maintains the agreements for access to each service, the criteria, the cost, if appropriate and access levels for different types of user
  2. Access Management must be included in the IT Service Continuity Management plan so that the process can operate in the event of a major business disruption
  3. Information Security Management lays down the policies which Access Management follows
  4. Access Management works with Supplier Management to ensure that 3rd party supplier’s access rights to data are controlled
  5. Access Management works with Capacity Management to ensure this warranty aspect is delivered
  1. Access Management receives access requests through the Service Operation process of Request Fulfilment
  2. Access Management will log occurrences of abuse of access rights through the Service Operation process of Incident Management
  3. Access Management may receive access requests through the Service Transition process of Change Management
  4. Access Management will highlight issues to Continual Service Improvement
  5. Access Management will validate test plans as part of Service Transition to ensure they test adherence to data access policies
  1. Two or more users may share the same common piece of information used to verify identity
  2. Two or more users may have the same rights to data, and may therefore share a common identity on the system
  3. Neither
  1. % of requests which are for an increase in access rights
  2. % of incidents involving actual or attempted inappropriate access to services
  3. Number of errors found in audits involving out of date access settings for users
  4. Number of incidents caused by incorrect access settings or where access rights needed to be reset
  1. Access Management may maintain a catalogue of standard roles and the access required for each
  2. Users may be added to a service group and will therefore be granted all the access rights for that group
  3. Neither
  1. Controlling access from ‘back door’ sources such as application interfaces and changes to firewall rules for special needs
  2. Security policies become bureaucratic and/or excessively difficult to follow, discouraging compliance
  3. Neither

Author of lecture Acess Management: Process Management

 IT Training Zone

IT Training Zone


Customer reviews

(1)
5,0 of 5 stars
5 Stars
5
4 Stars
0
3 Stars
0
2 Stars
0
1  Star
0