Hidden Gold in Automating Recurring Processes
Here's a typical IT scenario: each quarter, you need to check audit user access to a critical application. Your internal security standards require that you revoke access for those who haven't been on the system for over 90 days. I've seen this before, and the process (at the time) had many challenges: It's manual; we did a quick-and-dirty set of steps years ago to cover the minimum requirements, that involves extracts from application logs, file transfers MS Access and MS…
