Audit-ready governance depends on reliable user attribution. When accounts are shared, approvals, reviews, and evidence actions become harder to defend.
EAB uses IP and geo-based access signals to help regulated organisations identify suspicious access patterns and preserve the integrity of the audit trail. The purpose is governance integrity — not surveillance.
When accounts are shared, governance actions — approvals, rejections, evidence uploads, screening runs — cannot be reliably attributed. The audit trail becomes weaker. For regulated organisations, attribution is part of the evidence record.
When a user account is active simultaneously from different IP addresses, a concurrent session signal is generated. The signal is logged and visible to governance admins — not acted on automatically.
Login events from geographically distant locations within an implausible time window generate a geo-anomaly signal. The signal flags the access event for review — without automatically restricting access.
Account-sharing detection is a governance control based on access behaviour signals — not automatic restriction or accusation. Signals support responsible review by governance admins. They do not replace human judgment.
All access events — including flagged sessions — are logged in the audit trail with timestamp, IP address, and geo-location. The access record is part of the governance evidence, not a separate security log.
Supervisor approvals, evidence uploads, screening runs, and administrative actions are attributed to specific user accounts. Access integrity controls protect the reliability of these attributions in the governance record.
Password requirements and MFA prevent unauthorised access. Account-sharing detection addresses a different problem: authorised credentials being used by multiple people. Both controls are necessary for governance integrity.
Account-sharing detection is not a one-time check. It is an ongoing access integrity signal that supports governance review across the full compliance lifecycle.
Every login and session event is logged with IP address and geo-location context. The access log is part of the governance record — not a separate security system that must be manually correlated.
Concurrent session and geo-anomaly signals are generated automatically from access patterns. Signals are flagged in the governance admin view — visible to mandanten_admins responsible for access integrity.
The governance admin reviews flagged access signals — assessing whether the pattern indicates account sharing or a legitimate access scenario. The review decision and outcome are logged in the audit trail.
At audit time, governance actions attributed to specific users are supported by the access integrity record. The organisation can show that access controls were in place and that anomalies were reviewed — not ignored.
Governance integrity depends on reliable user attribution. EAB's access signals support governance review — so the audit trail reflects who actually took each action.
EU-hosted · Anchored to CELEX 32024R1689
Tell us about your organization and what you’re looking to address. We’ll follow up with the relevant information.