MARC – PAM module: Controlled emergency access and understandable log-reports
Everyone wants reliable information. We cater for this by tight access security to an information system: restrict access to critical functionality and avoid access violating Segregation of Duties rules. And next we ensure that, after acceptance of the information system by the user organization, no configuration changes can be made directly in the productive system. … Continued