Identity Lifecycle – User behavior review: As part of the identity lifecycle, user behavior review involves regularly reviewing and monitoring the actions and activities of users to identify any suspicious or unusual behavior. This is typically done to identify potential security threats or breaches within an organization. An example of user behavior review as part of the identity lifecycle is using security analytics software to monitor user activity on a network and alert security personnel of any suspicious activity.
Categories: CC D5: Security Operations | CCSP D5: Cloud Security Operations | CISM D3: Information Security Program | CISSP D1: Security and Risk Management | Security+ D5: Security Program Management and Oversight | SSCP D2: Access Controls
« Back to Glossary Index