Many regulations, laws, directives, and frameworks include requirements for User Access Reviews (UARs)—comprehensive assessments of access privileges (e.g., to applications, resources, etc.) within an organization’s IT environment.
Compliance isn’t optional, and the consequences of non-compliance can be steep.
For a few reasons (which we touch on below), today’s UARs present significant challenges. Further complicating matters, many organizations still largely rely upon time-consuming and error-prone manual processes.
But there’s a better way.
The UAR stakes are higher than ever
UAR requirements are especially common in highly regulated environments, in which organizations must comply with industry-specific legislation such as the Health Insurance Portability and Accountability Act (HIPAA), and Good Practice (GxP) guidelines.
However, UAR requirements are also captured in wider-reaching pieces of legislation. One prominent example is the Sarbanes-Oxley (SOX) Act, which applies to all U.S. public companies.
Failure to comply with UAR obligations can be extraordinarily costly for the offending organization.
The primary concern for many orgs is likely regulator-imposed financial penalties—a risk made all the more real as U.S. regulators have issued billions of dollars in fines against financial services firms, hundreds of millions of which relate to the use of applications like WhatsApp without appropriate controls and tracking in place.
Nevertheless, reputational damage and the disruption caused by cyber attacks (e.g., that exploit poor controls) are also common consequences, and shouldn’t be overlooked.
As IT environments have grown ever-more complex, identity controls and associated processes (including UARs) have become a foundational component within cybersecurity frameworks and related legislation.
Perhaps unsurprisingly, expectations for similar controls are now frequently captured within cyber insurance contracts. Failure to demonstrate an effective identity and access management may constitute negligence on the part of the insured organization, providing sufficient grounds for the cyber insurer to refuse payouts or impose higher costs for coverage.
For example, in a recent attack against the city of Baltimore, a fraudster accessed the Workday account of a vendor that does business with the city and changed the payment details. As a result, the city unknowingly transferred $1.5 million to an account controlled by the fraudster.
Although the city was able to retrieve a portion of the funds, insurers have refused to pay the rest—taking a hard line regarding the insufficient security policies that enabled the fraud to occur.
Broadly, user access reviews come down to two things:
As IT environments have expanded in scope and exploded in complexity, implementing and reviewing controls has become significantly more challenging.
While yesterday’s organizations could focus largely on perimeter controls to protect on-premises resources, and could implement access control lists involving a relatively small number of human users and small number of applications, today’s organizations must grapple with a highly dynamic environment that includes:
Establishing effective controls across all of these user and resource combinations is an enormous undertaking. And things become all the more difficult when apps lack the standards and APIs upon which IAM and IGA systems rely.
Plus, in an environment in which the app library is ever changing and people are constantly changing roles (joining and exiting the organization, gaining or losing responsibilities), there must be processes and workflows in place to ensure user access keeps pace with change.
Crucially, doing all of that work isn’t enough—organizations have to be able to prove that they’ve done the work. Usually, proving it involves:
User access reviews often involve:
And, for one reason (“Only a few of our apps are integrated into our IGA solution”) or another (“Many of our apps don’t expose APIs, limiting our ability to automate”), automation only covers a small set of critical apps.
As a result, whenever a UAR is needed, the process can disrupt normal activities and consume countless hours of team member time for weeks—and due to the importance of UARs to meeting compliance obligations and the sensitivity of the resources involved, these aren’t tasks that can be outsourced to a low-cost provider or delegated down the organization’s hierarchy.
Perhaps most dangerously, this manual approach introduces considerable risk. As revealed in Cerby’s 2025 Identity Automation Gap Report, 46% of security and IT leaders say their organization has already experienced a security, compliance, or operational issue directly caused by manual identity workflows.
The 2025 Identity Automation Gap Report showed that 49% of respondents said the single most important step they would take to reduce identity risk is extending automation across more applications and workflows.
However, many disconnected apps, including legacy financial systems and government portals, remain “disconnected” because they lack support for modern standards like SAML, SCIM, or OAuth. Without SCIM or usable APIs, IGA solutions cannot automate workflows across the entire application ecosystem.
Fortunately, there’s an alternative to building and maintaining custom integrations in an effort to connect your IAM and IGA infrastructure to your full app ecosystem.
The Cerby Application Network is a collection of pre-built and fully validated Cerby integrations for thousands of apps.
In addition to enabling enterprise Single Sign-On (SSO), Multi-factor Authentication (MFA), and automated LCM, the Cerby Application Network extends the reach of your existing IAM and IGA platforms, providing:
In short, Cerby connects your existing IAM and IGA solutions to apps that would otherwise be beyond their reach.
This greater reach across your apps—and the higher degree of automation that this reach enables—unlocks a number of meaningful benefits, including:
Meeting UAR compliance obligations shouldn’t require a protracted, ponderous, and painful process.
Whether you're preparing for a SOX audit or maintaining year-round compliance hygiene, Cerby automates and simplifies the UAR process—even for disconnected applications—eliminating weeks of manual effort and audit prep while ensuring verifiable compliance.
To learn more about how we can help simplify your tomorrow, contact Cerby today.