Unauthorized Access


Use this content use case to create a security case for unauthorized access.

Content pack title

Security Incident Handling Management

Case template

Unauthorized Access

Task templates

  • Are user credentials compromised
  • Determine if malicious software was introduced
  • Deactivate user account
  • Contact user and determine intent
  • Lessons learned meeting

Service request activity flow

The following sequence occurs when a security case is created for unauthorized access:

Unauthorized access request workflow




 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*