Add additional approval steps for flagged sensitive access.
Current Situation: Cerner Millennium access requests originated in their Identity Manager system at this organization. End users would log in to front-end User Application system, select the needed access, and submit it for approval.
Impact: The organization's compliance team updated their requirements and now needed to approve privileged Cerner access.
Resolution: GCA worked with the client to identify the precise Cerner access that the compliance team considered privileged. This access was flagged in their IDM system. GCA then modified the approval path so that the compliance team would have the final approval before the privileged Cerner access got provisioned.