There are frequent user access changes that occur in a company's information technology (IT) systems. Whether a new employee requires access or an existing employee requires access modifications or termination, it is important to have a process in place for IT application security user access in place. This sample process flow outlines the steps to manage user access changes to company IT systems.
This document should be used as a general guide to understand and review this business process. Organizations should customize this tool to ensure that it reflects their business operations and continuously monitor the process to ensure that the steps described are accurate.