Your space
Dynamic signageVideo (EasyMovie)
AUDIENCES
Customers
Employees
Flux
Market
resourcesCASTINGABOUTCONTACT
Help centerSupportLegalCybersecuritySite map
Your space
Dynamic signageVideo (EasyMovie)
CONTACT
Latest articles
Everything you need to know about the regulation of window advertising screens
Discover the rules to follow to install an advertising screen in the window, best practices and solutions adapted to businesses and retailers.
Read the article
Digital signage
Point of sale
What is Retail Media and why is it strategic?
An accelerator of decision-making in the consumer buying journey, retail media is experiencing strong growth. Discover how it works and its challenges.
Read the article
Point of sale
What is flex office? Definition, operation, tools and solutions - Cenareo
Flex office is transforming the organization of work. Discover its advantages, disadvantages and the best practices for adopting it in business.
Read the article
Internal communication
Structuring your internal communication: the 8 essential steps
Discover an 8-step method to structure your internal communication, strengthen commitment and sustainably involve your employees.
Read the article
Communication
Nos recommandations pour bien choisir votre affichage publicitaire digital
Choisissez comme il se doit votre affichage publicitaire digital grâce à notre guide et développez efficacement votre visibilité.
Read the article
Digital signage
Technical guides
The advantages of a DOOH advertising network to maximize campaign performance
Discover how a specialized DOOH advertising agency optimizes digital signage to maximize visibility and strengthen the influence of a brand.
Read the article
Digital signage
Monetize and make profitable your in-store screens
Digital signage screens are communication spaces with high potential for profitability. Discover the solution to monetize your screens.
Read the article
Digital signage
Point of sale
Video editing: creative tips and tools
Learn the best video editing tips and tools to easily create engaging and professional content.
Read the article
Video
Video tutorials
Zero-click content: what is it, and why create it?
Learn how to create effective “zero click” content to attract and engage your audience without them having to click for more information.
Read the article
Video
6 best practices for successful remote onboarding
Learn best practices for successful remote onboarding. Discover effective strategies for integrating your new collaborators virtually.
Read the article
Internal communication
See all items
CONTACT
MENU
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

This policy ensures that access to sensitive information and systems is granted on the basis of least privilege and helps to mitigate the risk of unauthorized access. ‍

‍

Identity and Access Management (IAM)

Cenareo maintains documented processes for identity and access management (IAM) for internal and external users.

The IAM program is subject to regular reviews and updates to reflect technological changes, industry best practices, and regulatory requirements.

These processes cover the entire user lifecycle, including:

  • New employees: accounts for new employees are created with appropriate access rights based on their role and responsibilities.
  • Mutations: When an employee's role or department changes, their access rights are reviewed and adjusted accordingly.
  • Layoffs: In the event of dismissal, all user accounts and access privileges are promptly deactivated or deleted.
  • External users: access to external users (contractors, vendors, etc.) is granted on the basis of the principle of least privilege and the specific needs of their role.

‍

Recertification of access

The access rights of all users (internal and external) are reviewed and recertified periodically to ensure that they are still needed and that they respect the principle of least privilege.

‍

Role-based access control (RBAC)

We implement role-based access control (RBAC) as the primary method of managing user access to systems and applications. Under RBAC:

  • Roles: predefined roles are established, each with a specific set of permissions and access rights aligned with typical professional functions and responsibilities. 1/2 Cenareo- SAS with a capital of 22175€ R.C.S Toulouse 789 137 650- APE: 789 137 650- APE: 6201Z VAT intra: 6201Z VAT intra: FR 789 137 650 Toulouse - Paris - Tunis - New York cenareo.com
  • User assignment: Users are assigned roles based on the requirements of their work.
  • Minimum privilege: Users are granted the minimum number of privileges necessary to effectively perform the tasks assigned to them.

‍

User access review frequency

  • Professional users: the access rights of professional users are reviewed at least once a year or in the event of a significant change in role or responsibilities.
  • Privileged users: The access rights of privileged users (for example, system administrators) are reviewed quarterly due to the higher risk associated with their high permissions.
  • Generic/shared accounts and system/service accounts: Access rights to generic/shared accounts and system/service accounts are reviewed twice a year to ensure that they are still needed and used appropriately.

‍

Detecting unauthorized access

We have implemented controls to detect unauthorised access attempts. These controls are as follows:

  • User Activity Monitoring: User activity on critical systems is monitored for suspicious behavior.
  • Log Management: System logs are collected and analyzed for unauthorized access attempts.
  • Access reviews: regular access reviews help identify discrepancies and potential abuses of access privileges.
  • Strong password policies: Enforcing strong password policies and multi-factor authentication helps prevent unauthorized access.

‍

Privileged access management

In addition to the access review processes described above, we are implementing additional controls for privileged access management:

  • Just-in-Time Privileged Access (JIT): Granting elevated privileges only when needed for a specific task and returning to standard user privileges once the task is complete.
  • Session monitoring: Monitoring privileged user sessions to detect suspicious activity.

Besoin de nous joindre ?

Contactez nos équipes pour toute question sur ce sujet.

Contactez nous
Cenareo

Access Management Policy

Text Link
Engage your audiences,
become a media.
AUDIENCES
CustomersEmployeesFlowsMarket
SOLUTIONS
Digital signageVideo
Business
CastingAboutContact us
resources
BlogInsightsCustomer storiesVideos
© CENAREO 2025, All rights reserved.
Help centerSupportLegalRGPDCybersecuritySite map
en
fr
en
Cenareo - affichage dynamique, solution video