Senior IT Project Manager @ Deutsche Bank

Continuing to introduce the Technical Access Brokerage & Monitoring solution. This least-privilege solution enables us to remove administrator privileges, enforce standard user permissions, simplify the enforcement of least-privilege policies, maintain infrastructure and application access control, as well as log privileged activities. It relies on the capability to verify the purpose of why a system administrator is requesting access prior to granting it and allowing him to proceed. The decision, whether privileged access is granted or denied, is based upon verification of change- or incident ticket Information and status. The chain of control and evidence is supported to fulfill governance functions by performing tasks such as change verification and root cause analysis. It also answers regulatory requirements regarding ongoing monitoring of vendor arrangements in case evidence for a potential lawsuit or service disruption must be provided. This happens by answering conveniently “who did what, where, when and why”.