Native change detection using workflows


Administrators can remove necessary access from a service account, which might stop a service or break an integration. Administrators can grant privilege entitlements and access to an account’s resources by mistake, which might increase the attack surface or expose the account’s sensitive data. These workflows give more visibility to source owners so they can certify the out of band granted/removed access. These workflows help to maintain the least privilege principle for correlated and uncorrelated accounts.