With this user access data assembled and mapped properly, the gatekeeper should work with the data profiler to discuss the criteria and any specific validation logic needed for the profiling activity. Creating mock-up examples of the type of reports or views the gatekeeper would like to see will be very helpful for the profiler. Expect that the gatekeeper and the profiler may run through a few iterations before getting the logic and views to the desired end result. From the profiling, you are looking to produce a relatively simple output that can provide the following types of user access insight:
There could also be other scenarios that can cause inappropriate access assignments, but the point here is to create a process that allows user access assignments to be regularly monitored and audited. These types of views also allow the gatekeeper to fully understand who the users and groups are, where they exist, with what business functions they are associated, and ultimately, to provide the insight needed to make decisions that are necessary to tightly control access to the customer master data.
Table 7.4 provides an example of the type of user access report that can be produced from the profiled data. This type of report can be used to regularly monitor individual and group access capabilities in alignment with their access requirements and allowed capabilities, or can reveal where inappropriate capabilities exist that will need corrective action. In Table 7.4, the darker highlighted cells are used to indicate cases where an individual or group has an access capability that is unexpected or inappropriate. Upon seeing this, the gatekeeper can review the case with the user, manager, or process area data steward to decide what actions to take.
The underlying logic and scripts used to generate this type of report should be reusable and should require only minor ongoing maintenance. Make sure that this type of report provides sufficient detail to act on but is still simple enough that the information can be easily shared as needed with the user groups, data stewards, or the governance council.