Check and approve user IDs, role profiles, and parameter requests based on approved access matrices and established procedures.
Verify Business Unit (BU) signatures according to authority instructions.
Ensure all user access or parameter maintenance transactions are accurately performed.
Access Review & Exception Handling:
Conduct periodic reviews of user access/profiles to ensure appropriateness according to function/role and approved access matrices.
Review user access and parameter exception reports, investigate all exceptions, and ensure satisfactory resolution or escalate promptly to management.
Project Participation & UAT:
Participate in new system projects, assess user access functionality, and conduct User Acceptance Testing (UAT) to ensure compliance with Group IT Security Policy.
Document user access controls and train other checkers and makers on tested systems prior to implementation.