Skip to main content

ER-38 Walkthrough - Privileged Access to the Application(s)

Suzette Richards avatar
Written by Suzette Richards
Updated over a year ago

What to Provide

A screenshot demonstrating all users with privileged access to the in-scope application(s).

Evidence Format
Screenshots or exported images in a common image file type such as .jpg, .png, or .pdf.

Additional Guidance

This evidence should demonstrate all users who are able to make changes to your in-scope application(s). Changes to the in-scope application(s) include the ability to:

  • Add, modify, or delete customer application configurations

  • Add, modify, or delete customer data

Privileged access to your application may be controlled by code repositories, backend systems, and/or frontend admin systems or portals.

Ensure that you have included all methods and users that are capable of making these changes.

Related Articles

Associated Unified Control ID

Associated Framework Control

CTRL-9

LCL-32

Did this answer your question?