Viewing Mitigations in a Risk Analysis
Once Mitigating Controls and Mapping Rules have been created, these will automatically be evaluated as part of any risk analysis, including for SoD / Sensitive Access reporting or What If simulations.
- Run a Security Extract and Utilization Extract to provide data.
- Make sure that you have a multi-system Rulebook in place, which defines the risks.
- Upload Mitigating Controls, which defines exceptions that may be allowed and the circumstances for each.
Documentation Feedback
Feedback is provided as an informational resource only and does not form part of SailPoint’s official product documentation. SailPoint does not warrant or make any guarantees about the feedback (including without limitation as to its accuracy, relevance, or reliability). All feedback is subject to the terms set forth at https://developer.sailpoint.com/discuss/tos.