For a full overview of the UCT role model for third parties, see: UCT role model for third parties
See also: Policy: Roles and responsibilities of Third Party System users
Authorizers/approvers must ensure that the correct role and only the required access is assigned to mitigate the following potential security risks and avoid unnecessarily wasting UCT resources:
Potential security risk |
Mitigation |
Incorrect internet access has been granted. |
|
Incorrect role has been assigned. |
|
Incorrect time period has been assigned to third party user. |
|
Incorrect identification has been provided. |
|
User already exists in the Third party system. |
|