Creating reports on the current state of user permissions and violations of policies and regulations Our technology partners’ systems enable real-time monitoring of changes in user permissions, risk assessment related to held accesses, and identification of security policy violations. Periodically generated reports include the actual state of employee permissions, accounts without identified owners, identities at increased risk, or breached policies.