The execution of Access Management activities is normally triggered by:
* Service Requests, taken by the Service Desk or submitted using automated and self help mechanisms
* Requests from Human Resources personnel
* Direct requests from department managers
* Request for Changes (RFCs) involving modification of access rights
* Requests for enabling restricted access to contractors and external suppliers.

Some of the key interfaces that need to be maintained within the Service Lifecycle are:
* Service Design
o Information Security Management, in the development and renewal of security policies, guidelines and procedures, which are then executed by Access Management
o Availability Management, in the design of security systems and infrastructure
* Service Transition
o Change Management, which should coordinate changes to processes and any groups and roles defined for Access Management
o Configuration Management, which can be used to record relationships between users and systems they can access.

Categories: News