Archives

Risk Rating: Medium

Access Request lifecycle reports

SSM should provide various access request lifecycle stats such as request types, average time for request approval/completion, SLA status, average time for access provisioning along...

All Users (membership) Access

The control report provides lists of all the SharePoint objects that have been shared with All Users (membership) group.  The report will be sent to...

Archiving conflicts with Configuration

An IT related risk where access to Archiving conflicts with Configuration whereby an individual could configure the production environment to limit monitoring of the inappropriate...

AWS Accounts with AWS Config disabled

AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources.  Config continuously monitors and records your...

Basis Utilities & Client Administration

A developer could modify program components (menus, screen layout, messages, queries) and replicate these changes to other clients. This bypasses the inherent controls in the...

Basis Utilities & System Administration

A developer could modify program components (menus, screen layout, messages, queries) and configure the production environment to execute the program with these changes. This may...

Box False Positive Files

The control report provides a list of all the sensitive files marked as False Positive; where the files indicate the presence of a condition, when...

Box Whitelisted Files

The control report provides the list of all the files marked as whitelisted in Box.  Whitelisting will skip the files or folders from being scanned,...

Confidential Documents on Site

The control report provides visibility into documents classified as confidential on a SharePoint site.  The report will be sent to IT security admin and managers...

Count of Applications by Role

The Count of Applications (programs and reports) by Role analytic control provides visibility for those roles that may have been configured with an inordinate amount...

Count of Functions by Responsibility

The Count of Functions by Responsibility analytic control provides visibility for those responsibilities that may have been configured with an inordinate amount of functions. The...

Count of Functions by User

The Count of Functions by User analytic control provides visibility for those users that may have been configured with an inordinate amount of responsibilities and/or...

Count of Permission Lists by User

The Count of Permission Lists by User analytic control provides visibility for those users that may have been configured with an inordinate amount of permission...

Count of Responsibilities by User

The Count of Responsibilities by User analytic control provides visibility for those users that may have been configured with an inordinate amount of responsibilities and/or...

Detects orphan accounts

Detects all GCP Orphan Accounts.  An orphan account is a account with no owners.  Control reports are provided to IT Security Admins and Managers to...

Documents In Site Collection

The report provides the list of the SharePoint documents In Site Collection.  The report will be sent to IT security admin and managers on ongoing...

Entitlements added or removed

SSM provides the details of all changes (addition/removal) to the application entitlements against a set baseline. SSM can be configured to automatically provision/revoke such entitlements...

Financial Violation Classification

The control reports list of all the file related to Financial content.  All Financial documents are considered as High Risk and access to these files...

Files shared with public

The report provides the list of files shared with public in Google Apps.  The report will be sent to IT security admin and managers on...

Groups with access to Object records

The control report identifies groups with access to object records in order to monitor access types, such as ReadOnly/Write/Read for all members of a current...

List of Ownership

The report provides list of all SCA, PSO, SSO, TSO and FSO of a site collection.  The report will be sent to IT security admin...

Major and Minor Version

The report provides the list of the Major and Minor versions of a document.  The report will be sent to IT security admin and managers...