Account governance provides insights into all the processes currently in your Kissflow account. This feature improves data governance by providing you visibility, control, and the ability to make informed decisions about the usage and optimization of processes.
The Status section on the process governance page lets you know about the distribution of processes across live and draft statuses. The Idle processes section lists all the processes with no item activity in them for the selected time period. Based on this, you can decide which processes are no longer needed and can act on them accordingly.
Security and permissions
Public forms enabled section lists all the processes that have enabled public forms in their security settings. From this, you can determine which process forms can be accessed externally, as this exposes any information contained within the forms.
From the Externally connected section, you can identify the processes exposing sensitive data outside your account through external connectors of your account’s integrations. Being aware of such processes helps you manage data security and minimize the risks associated with the exposure of sensitive data outside your Kissflow account.
Unrestricted download permissions and Unrestricted print permissions sections inform you about the process attachments, and forms that anyone can download, and print respectively. This helps you identify the processes that can share sensitive data to people, or systems outside Kissflow.
You can click any process to access its detailed page where you can see the status of the process, its creator, and date of creation. You can also see when, and by whom the process was last published. Apart front these details, you have a lot of other sections where you can learn more about the process.
The Admins section displays all the admins in a process along with their roles. To ensure security and prevent unauthorized access, it is important to identify the individuals or groups with administrative privileges for a specific process. This information allows you to monitor and control privileged access. Regular monitoring and review of the admins can help you maintain the integrity and confidentiality of the process, reducing the risk of unauthorized actions or data breaches.
You can assess the productivity of a process by analyzing the activity within it. This includes the number of item creations in the process, and any submissions done in all the steps for a selected time period.
This provides valuable insights into the process's effectiveness and helps you identify areas for improvement to enhance productivity and streamline operations.
This section lets you know if a process has enabled public forms or not. If this is enabled, the process form can be accessed by systems outside Kissflow and may expose sensitive data.
In this section, you can check out the list of integrations connected to a specific process. It shows you the statuses of those integrations and the connectors they use. This way, you can make sure the process is only connected to the integrations they're supposed to, and avoid any data exposure risks.
Flows looked up from and looked up to
Under the Flows looked up from section, you can view a list of flows that a process can look up data from. Data from those flows are exposed to the specific process.
You can view a list of flows that can look up data from a specific process using the Flows looked up to section. Data from this process is exposed to the flows that look up this process.
Download, print, and export logs
In this section, you can keep an eye on all the instances of downloads, prints, or exports of flow data (attachments, forms, and reports respectively). Using this, you can spot any instances where sensitive data might be shared with people, or systems inside and outside Kissflow and take action to prevent it.
By utilizing the audit log, you can gain visibility and valuable insights into activities performed in a process. It provides a comprehensive record of all actions with respect to time, allowing for detailed analysis and a deeper understanding of the process. Based on this, you can track and examine various activities in the process for enhanced monitoring and security purposes.