0 / 60 seg.

How often should security teams conduct a review of the privileged access that a user has to sensitive systems?