The organizations should address any changes to the identity and access controls using the pre-established baseline. These changes could be from the proactive management of exploits via vulnerability scanning or reactive management of issues via incident management.
Define and implement a user access provisioning process which authorizes, records, and communicates access changes to data and assets.