Risk Detection Project
Back to Home

Enhancing Access Requests with Risk Detection

A key outcome was the discovery of two core personas: People Managers and Risk Owners. Created a tailored workflow that serves both use cases; simplified the explanation of risk information to help users take confident, informed mitigation actions.

Project Outcomes

Discovered a new Risk Owner persona., Addressed the issue of users multitasking. Further prioritized and simplified users' tasks.

Successfully launched the 2021 Releaseby adopting Risk Criticality and Presentation Ecosystem across other security products.

Helped support over 8 major clients (including Shell, BP, and more), impacting 1000+ primary users. Resolved 10+ customer tickets and improved NPS score by 30%.

Problem

How to Incorporate Risk content into the Request Review flow?

Previously, the Request Review flow was designed without risk considerations. However, with risk now enabled in our system, the review process has become a critical touchpoint for presenting and explaining risks to users. By providing relevant risk information within the flow, users can make informed decisions on whether to approve or reject access requests.

Original Design

The original design did not include risk information. The new requirement is to incorporate risk details to provide approvers with better context, enabling them to make informed risk-based decisions.

Old Design

Understand User Story

The project focuses on Approvers, who are responsible for reviewing employee requests. Approvers are typically people managers overseeing their employees' access requests. The review process begins when Approvers receive a notification or locate a request number in their pending list. It concludes when they take appropriate action—either approving or rejecting each access request.

User Story

User Testing Results

Conducted a moderated usability test with six participants from two clients. Organized affinity notes from their feedback and gathered key insights for improvements.

User Testing AnalysisUser Testing Insights

Challenges

The primary challenge lies in balancing technical complexity with business simplicity.

Challenges

Discovered...

👨‍💻 People Managers (70%)

This group has limited knowledge of risk and may not prioritize it. Their primary focus is reviewing requests based on whether an employee’s role should have access.

👩‍⚖️ Risk Specialists (30%)

This group is responsible for setting up risk rules, reviewing risks, and ensuring security compliance within the company..

Ideation

Created two workflow designs and hand-sketched corresponding pages, then discussed them with the team:

People Managers and Risk Specialists:Flowmap

Final Design

Addressed the challenges by designing distinct experiences for both

People Managers and Risk Specialists:Final product design