Who has access to what? Who granted that access? When did it change? And is it documented? Preferably, this instant.
Most organizations discover their identity and access gaps when an auditor asks, and by then it is usually a tangled mess to provide the requested documentation, since everything has been working just fine until then. That is, unless you have a strategy in place and tackle the challenge early.
For DKTV, formerly Dansk Kabel TV, these challenges mattered early on. When GDPR came into effect, they needed to be ready for audits across their entire identity chain. That early insight has proven valuable over time, as NIS2 and other regulations have increased the need to keep identities and their access in order.
A different operating model
To address these challenges, DKTV implemented Pointsharp Identity Lifecycle Management to strengthen governance in its Active Directory and Entra, with improved documentation, automated identity lifecycle events, and a clear joiner-mover-leaver process.
It marked a drastic shift from human-driven workflows to rules and reliable data as the workflow engine. It established consistency, visibility, and repeatability across identities and access in the organization.
It also meant that the onboarding process could be converted into event-driven automation rather than copying existing users.
- Today, DKTV has come a long way in regulatory compliance, which, among other things, means:
- Audit-ready documentation is part of normal operations.
- Less inherited access and fewer exceptions.
- Reliable offboarding with no ghost access left behind.
- Less time spent on manual identity work.
In our case-study on DKTV and their identity automation journey, you can find all the details on how they went from manual identity work to event-driven identity lifecycle management. You will also find some valuable tips on how to do this right, something more human-driven than just introducing new technology in an organization.