Watch this video on YouTube
During an annual review, you discover that several employees have access to critical systems beyond the requirements of their current roles. What is the most effective approach to addressing this over-privileged access?