Scenario
You have been hired as a security analyst at a midsize financial organization, FinSecure Corp. The company is undergoing a security review and has asked you to assess its current access management practices, operational security processes, and system threat activity. You have been provided with a user role matrix,