Watch this video on YouTube
As a security administrator for a tech firm, you're tasked with revising procedures to ensure that contractors' system access is revoked as soon as it's no longer needed. What is the MOST efficient method to achieve this?