How idax helps you reduce risk with better staff engagement
Why Entitlement Reviews Matter
Entitlement reviews should be at the core of cybersecurity, limiting insider access to sensitive systems and data
Yet, many entitlement reviews are failing, with managers overwhelmed, auditors frustrated, and organisations still vulnerable to insider threats. With over 80% of ransomware attacks stemming from insiders’ accidental, negligent, or malicious actions, current user access review methods aren’t offering the needed protection.
Why are these user access reviews failing? First, they inundate managers with countless access permissions to review without prioritisation, forcing rushed, superficial approvals. Second, managers lack essential information about the security risks each access poses, making it impossible to distinguish safe permissions from risky ones. Finally, user access reviews are viewed as tedious compliance tasks rather than valuable cybersecurity measures, further disengaging managers.
Three changes can improve entitlement reviews:
- Use AI to Reduce the Workload: AI can triage low-risk entitlements, leaving only high-risk cases for managers to review. This targeted approach streamlines user access reviews and prioritises security.
- Provide Managers with Relevant Data: Effective user access reviews require context. Managers need visibility into each access’s purpose and associated risks, allowing them to make informed, security-focused decisions.
- Engage Managers as Cybersecurity Partners: Instead of viewing user access reviews as a compliance task, organisations should treat managers as key defenders, providing feedback on the security impact of their work.
For measurable progress, organisations should track these KPIs:
- Removal Rate: Target a 15-20% removal rate for outdated access.
- Approve-All Rate: Keep this below 50% to ensure managers aren’t simply approving all access.
- AI Rate: Aim for AI to handle at least half of entitlements.
- Re-Request Rate: Keep below 10%, indicating that unnecessary access isn’t being repeatedly granted.
One idax client illustrates these principles in action. Before implementing idax’s AI-driven approach, this organisation had a 4% removal rate, 75% approve-all rate, and zero automation. After a transformation with idax, their removal rate rose to 12%, approve-all dropped below 50%, AI reviewed 54% of user access rights, and ignored entitlements fell to just 1%.
For organisations serious about fighting insider threats, entitlement reviews must change. At idax, we help turn ineffective entitlement reviews into proactive cybersecurity tools. To find out more listen to our recent podcast.
Trusted by
Live Demo
Set up idax in your own environment and
see it work with your data.
Risk Discovery
Get your Risk Discovery Report and start
fixing risks in your company.





