# Governance, Risk, and Compliance

### Identity Threat Detection & Response for Enterprise Security

![SCR-20221003-rqu](https://oort.io/hubfs/SCR-20221003-rqu.png)

#### Ace the audit with low-lift access reviews.

Make access reviews a part of normal business operations instead of an all-out scramble at the time of audit. Check in directly with users or their manager and confirm account status, applicable controls, authentication behavior, and more.

![SCR-20221003-rs4](https://oort.io/hubfs/SCR-20221003-rs4.png)

#### Maintain posture for the policy police.

Prevent large cohorts of identities from tanking your compliance efforts due to low visibility and poor attribution. Maintain strong security posture with Identity Security Checks and alerting for multi-factor authentication (MFA), inactive users, coss-system discrepancies, immortal sessions, and other mission critical compliance controls.

![SCR-20221003-rti](https://oort.io/hubfs/SCR-20221003-rti.png)

#### Take control of identity compliance.

Eliminate compliance threats caused by identity blindness and sprawl. Reign in identity sources with comprehensive coverage of every identity in your organization across identity providers and HR systems.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.oort.io/blogs/governance-risk-and-compliance.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
