Review and audit permission logs for security assessments.
Ensure the right people have the right access.