Combining logical access files with HR employee master files for authorized users
Combining file library settings with data from the change management systems and dates of file changes that can be matched to dates of authorized events
Matching ingress with egress records to identify tailgating in physical security logs
Using data analytics results to produce reports (e.g., group, summarize, exceptions/detail of devices)
Reviewing table or system configuration settings
Reviewing system logs for unauthorized access or unusual activities
Testing system conversion
Testing logical access segregation of duties (e.g., analyzing Active Directory data combined with job descriptions)