How often should security teams conduct a review of the privileged access that a user has to sensitive systems?
When a User leaves the organisation
On a periodic basis
When a User changes roles
On a daily basis