Skip to content

Access Request

carlos-ballester edited this page Sep 9, 2014 · 1 revision

Access Requests

An access request is the particular combination of a given user requesting to use a certain asset.

An Access Request is composed by the following fields:

Access request

Where:

  • Asset is the requested asset to work with
  • User is the user requesting access
  • Threat is the inferred threat for that particular combination of a user, an asset and a set of clues
  • User Action represents whether the asset was finally accessed or not
  • Status defines whether the request has been reviewed by the CSo or an IT security expert and flagged as compromised or free of security incidents
  • Timestamp is the exact time when that request was generated