An information security manager learns users of an application are frequently using emergency elevated access privileges to process transactions. Which of the following should be done FIRST?
A. Request justification from the user’s managers for emergency access.
B. Request the application administrator block all emergency access profiles.
C. Update the frequency and usage of the emergency access profile in the policy.
D. Review the security architecture of the application and recommend changes.
A. Request justification from the user’s managers for emergency access.
B. Request the application administrator block all emergency access profiles.
C. Update the frequency and usage of the emergency access profile in the policy.
D. Review the security architecture of the application and recommend changes.