Lifecycle
Where it sits in the operating model
The Protect phase is where this capability sits in the wider Fig operating model. New starters wait days for access. Role changes leave old permissions in place. Leavers retain access weeks after departure. HR and IT hand off via email and spreadsheets with no audit trail. Fig turns that problem into a repeatable lifecycle so MSPs, risk teams, and auditors are not relying on static spreadsheets or ad hoc screenshots when a buyer asks for proof.