be performed manually or using automation techniques available in some identity and access management (IAM) systems.