Organizations need to satisfy compliance requirements and be able to quickly address security threats. They need to centralize the access request process and put an end to ambiguity about who has access to what. This white paper outlines six steps to achieving that data access governance.