0% found this document useful (0 votes)
171 views17 pages

Access Management Policy

The Access Management Policy outlines standardized access control requirements for all information systems and data assets within the organization, ensuring access is granted based on legitimate business needs while maintaining confidentiality, integrity, and availability. It applies to all users, including employees and third parties, and includes detailed guidelines on user access management, privileged access management, remote access, authentication, and monitoring. The policy emphasizes principles such as least privilege, role-based access control, and the necessity of multi-factor authentication for enhanced security.

Uploaded by

mohammedhazzaa24
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
171 views17 pages

Access Management Policy

The Access Management Policy outlines standardized access control requirements for all information systems and data assets within the organization, ensuring access is granted based on legitimate business needs while maintaining confidentiality, integrity, and availability. It applies to all users, including employees and third parties, and includes detailed guidelines on user access management, privileged access management, remote access, authentication, and monitoring. The policy emphasizes principles such as least privilege, role-based access control, and the necessity of multi-factor authentication for enhanced security.

Uploaded by

mohammedhazzaa24
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Document Name Access Management Policy

Classification Internal Use Only

Document Management Information

Document Title: Access Management Policy

Document Number: ORGANISATION-ACS-MNM-POL

Document Internal Use Only


Classification:

Document Status: Approved

Issue Details
Release Date DD-MM-YYYY

Revision Details
Version
Revision Date Particulars Approved by
No.

<Provide details of
<Provide name of
1.0 DD-MM-YYYY changes made on policy
Approver here>
here>

Document Contact Details


Role Name Designation

<Provide name of author <Provide designation of author


Author
here> here>

Reviewer/ <Provide name of reviewer <Provide designation of reviewer


Custodian here> here>

<Provide name of owner <Provide designation of owner


Owner
here> here>

Distribution List
Name

Need Based Circulation Only


Document Name Access Management Policy
Classification Internal Use Only

CONTENTS

1. PURPOSE ........................................................................................................................... 4
2. SCOPE ................................................................................................................................ 4
3. TERMS AND DEFINITIONS.............................................................................................. 4
4. ROLES AND RESPONSIBILITIES .................................................................................... 4
5. ACCESS CONTROL PRINCIPLES .................................................................................... 5
6. USER ACCESS MANAGEMENT ....................................................................................... 6
7. PRIVILEGED ACCESS MANAGEMENT .......................................................................... 7
8. REMOTE AND THIRD-PARTY ACCESS .......................................................................... 9
9. AUTHENTICATION AND PASSWORD MANAGEMENT ............................................. 10
10. ACCESS MONITORING AND REVIEW ......................................................................... 12
11. ENFORCEMENT .............................................................................................................. 13
12. POLICY EXCEPTIONS ..................................................................................................... 14
13. ESCALATION MATRIX .................................................................................................... 16
Document Name Access Management Policy
Classification Internal Use Only

1. PURPOSE
The purpose of this policy is to establish standardized access control requirements for
all information systems, networks, and data assets owned or managed by [ORG NAME].
This policy ensures that access to these resources is granted only on the basis of
legitimate business requirements and in a manner that upholds the confidentiality,
integrity, and availability of organizational information, in alignment with ISO/IEC 27001
and SOC 2 Type 2 requirements.

2. SCOPE
This policy applies to all employees, contractors, consultants, interns, vendors, and
third-party users who are granted access to [ORG NAME]'s information systems and
data. The scope includes all forms of access—local, remote, administrative, and third
party—whether through on-premises infrastructure, cloud environments, or
integrated external systems.

3. TERMS AND DEFINITIONS


• Access Control: The selective restriction of access to information or systems
based on predefined rules and criteria.

• Authentication: A process used to confirm the identity of a user or system prior


to granting access.

• Authorization: The process of validating whether an authenticated user is


permitted to perform an action or access specific data.

• Least Privilege: The practice of limiting access rights to the minimum necessary
to perform job functions.

• Need-to-Know: Access is restricted to only those resources necessary for a user


to perform their specific duties.

• Privileged Access: Elevated permissions typically granted to administrators or


technical support personnel for managing systems.

• De-Provisioning: The revocation of access rights when no longer required due


to role change, termination, or other status change.

4. ROLES AND RESPONSIBILITIES


Role Responsibility

Chief Information Policy ownership, approval of privileged access, and


Security Officer (CISO) exception management.

Information Security Oversight, monitoring, and compliance enforcement.


Team Conducts periodic audits and access reviews.
Document Name Access Management Policy
Classification Internal Use Only

Executes provisioning and de-provisioning activities.


IT Operations Team
Maintains identity and access management tools.

Initiates access requests based on job responsibilities.


Line Managers
Validates business need.

Coordinates with IT to initiate and terminate user access


HR Department
during onboarding/offboarding.

Defines system-specific access roles and participates in


System Owners
periodic reviews.

5. ACCESS CONTROL PRINCIPLES


1. All access granted to users shall be based on the need-to-know, need-to-have,
and least privilege principles. Access must only be provided to information and
assets that are required for the user to perform their defined roles and
responsibilities.

2. A unique user ID shall be assigned to each individual requiring access to the


organization’s systems, networks, or information assets. This unique ID must be
directly linked to the individual and their job function to ensure accountability
and traceability of actions.

3. Use of shared user accounts shall be strictly prohibited and restricted to the
maximum extent possible. In exceptional circumstances where technical or
operational limitations necessitate shared access:

o A formal justification must be documented.

o Approvals must be obtained from both the Application Owner/Asset


Owner and the CISO.

o Shared account usage must be tightly controlled, time-bound, and


monitored.

4. Access to information systems and resources shall be governed by Role-Based


Access Control (RBAC) mechanisms, wherein users are mapped to roles and
assigned access privileges aligned to those roles. Roles shall be reviewed
periodically.

5. Access rights shall be designed and reviewed to ensure segregation of duties.


No individual shall have access to execute conflicting functions unless explicitly
approved and mitigated through compensating controls.
Document Name Access Management Policy
Classification Internal Use Only

6. USER ACCESS MANAGEMENT


1. User Registration and Unique Identification

o All users shall be uniquely identified using a centrally managed identity


system before any access is granted.

o A unique user ID shall be assigned to each individual and must be linked


to their specific job responsibilities to ensure accountability and
traceability.

o Group or generic accounts are prohibited unless explicitly approved and


justified in accordance with the Shared Account Usage policy.

2. Access Request and Approval Workflow

o Access requests must be formally initiated by the user’s Reporting


Manager through a designated Access Request Form or ticketing system.

o All requests must include:

▪ Justification of business need

▪ Role/function the user is performing

▪ Duration of access, if temporary

o The request shall be approved by both the Line Manager and the
Application/System Owner. No access will be granted without
documented approval.

3. Access Provisioning

o Upon receiving all necessary approvals, the IT Operations team shall


provision access based on the role-based access matrix (RBAC).

o Provisioning must be logged with details such as requestor, approver,


access granted, and time/date of provisioning.

o Temporary access should be clearly marked and configured with


automated expiry dates.

4. Access De-Provisioning

o The HR department and Line Managers must notify IT Operations


immediately upon employee resignation, termination, role change, or
internal transfer.

o De-provisioning must occur within 24 hours of the triggering event.

o Residual user accounts and credentials must be permanently removed


within 5 business days unless an extension is formally approved.

o All de-provisioning actions must be recorded in the De-Provisioning


Register.
Document Name Access Management Policy
Classification Internal Use Only

5. Access Review and Recertification

o System Owners shall perform formal access reviews:

▪ Quarterly for critical systems and privileged accounts

▪ Semi-annually for general business systems

o Review must validate whether current access aligns with role


requirements.

o Any access found to be excessive or obsolete shall be revoked within 7


working days.

o Results of the review must be documented and retained for at least 12


months.

6. Temporary and Emergency Access

o Requests for temporary access must follow the standard approval process
and specify a start and end date.

o Emergency or break-glass access shall only be granted in critical


scenarios, with prior CISO approval and continuous monitoring.

o All emergency access activity must be logged and subject to post-event


review within 48 hours.

7. Dormant Account Management

o User accounts that remain unused for 30 consecutive days shall be


automatically disabled by the IAM system.

o Accounts inactive for more than 90 days shall be permanently deactivated


and archived in accordance with the Retention Policy.

o The IT Operations team must review dormant accounts monthly and take
appropriate cleanup actions.

7. PRIVILEGED ACCESS MANAGEMENT


1. Definition and Scope

Privileged access refers to elevated system or application-level permissions that


allow users to perform administrative tasks, configure security controls, access
sensitive information, or override standard system restrictions. This includes, but
is not limited to, domain admins, system administrators, database
administrators, and superuser roles.

2. Eligibility and Business Justification

o Privileged access shall be granted only to users with job responsibilities


that explicitly require such elevated rights.
Document Name Access Management Policy
Classification Internal Use Only

o Every request must be accompanied by a documented business


justification and reviewed by the Application/System Owner.

o Final approval must be obtained from the Chief Information Security


Officer (CISO).

3. Approval and Access Provisioning

o All privileged access requests must follow a formal approval workflow via
the designated access management system.

o Privileged accounts shall be provisioned with the minimum necessary


access to perform required tasks and shall, wherever possible, be time-
bound and task-specific.

4. Multi-Factor Authentication (MFA)

o All privileged accounts must be protected using MFA irrespective of the


access method (local or remote).

o MFA mechanisms must comply with the organization's Authentication


and Password Management Policy.

5. Privileged Session Monitoring

o Activities performed through privileged accounts must be fully logged,


monitored, and reviewed on a monthly basis by the Information Security
Team.

o Session recordings or audit trails must be enabled for systems where


technical feasibility exists.

o Any anomalies or policy violations must be reported as security incidents.

6. Review and Certification

o Privileged access rights shall be reviewed monthly by System Owners in


collaboration with the Information Security Team.

o Any unauthorized or redundant access must be revoked within 48 hours


and documented as part of the access review process.

7. Service and Non-Human Accounts

o Service accounts with elevated privileges must be uniquely identified,


have strong credentials, and be monitored for misuse.

o Use of service accounts for interactive login is prohibited unless explicitly


approved and time-boxed.

8. Privileged Access Revocation

o Privileged access must be revoked immediately upon role change,


transfer, or termination.
Document Name Access Management Policy
Classification Internal Use Only

o Emergency removal procedures must be in place for revoking access in


critical incidents.

o De-provisioning activities shall be logged and subject to periodic audit.

8. REMOTE AND THIRD-PARTY ACCESS


1. Remote Access Requirements

o Remote access to [ORG NAME] systems shall only be permitted through


secure, organization-approved Virtual Private Network (VPN) solutions.

o Multi-Factor Authentication (MFA) is mandatory for all remote users,


including internal staff and third parties.

o Remote access requests must undergo documented risk assessment and


be approved by the respective Application Owner and the CISO.

o Access must be time-bound, and restricted to specific systems relevant to


the user’s role or engagement.

2. Endpoint Security and Compliance

o Devices used for remote access must meet corporate endpoint security
requirements including up-to-date antivirus, disk encryption, and firewall
controls.

o The use of personal devices (BYOD) must comply with the organization's
BYOD Policy and must be explicitly authorized.

3. Third-Party Access Controls

o All third-party access (e.g., vendors, partners, consultants) must be


governed by signed contractual agreements including confidentiality
and acceptable use clauses.

o Access must be granted using named individual accounts, never shared


credentials.

o Duration of access must be aligned with contract timelines or project


delivery milestones and must be automatically revoked upon expiration.

4. Monitoring and Logging of Third-Party Access

o All remote and third-party sessions must be logged and subject to real-
time monitoring for abnormal activity.

o Screen recordings or privileged session monitoring should be enabled


where technically feasible for high-risk systems.

o Logs must be reviewed by the Information Security Team for policy


compliance and potential misuse.

5. Third-Party Exit and Deprovisioning


Document Name Access Management Policy
Classification Internal Use Only

o Upon project completion, contract expiry, or disengagement, all third-


party access must be revoked within 24 hours.

o A formal exit checklist must be executed including account deactivation,


return of assets (if applicable), and data handover.

6. Periodic Review

o All remote and third-party access must be reviewed monthly by the


System Owner to verify continued need and appropriateness of access.

o Any access found to be redundant, inactive, or excessive must be removed


immediately and documented.

9. AUTHENTICATION AND PASSWORD MANAGEMENT


1. Password Policy Enforcement

o All users must comply with the organization's Password Management


Policy.

o Passwords must meet the following minimum complexity requirements:

▪ Minimum of 12 characters in length

▪ Must include uppercase, lowercase, numeric, and special


characters

▪ Must not be easily guessable (e.g., no reuse of username, DOB,


common words)

▪ Password history must be enforced to prevent reuse of the last 6


passwords

o Passwords must be changed at least once every 90 days or immediately


if compromised.

2. Multi-Factor Authentication (MFA)

o MFA is mandatory for:

▪ All privileged accounts

▪ Remote access users

▪ Users accessing sensitive or regulated systems

o MFA implementation must use two or more independent factors (e.g.,


password + token or biometric).

3. Temporary and Initial Passwords

o Default or temporary passwords must be system-generated and meet


password complexity standards.

o These passwords must be changed upon the first login.


Document Name Access Management Policy
Classification Internal Use Only

o Temporary credentials should have an expiry not exceeding 48 hours


unless extended with approval.

4. Credential Confidentiality and Handling

o Users must not disclose passwords or store them in insecure mediums


(e.g., documents, sticky notes).

o Credential sharing, password embedding in scripts, or use of hardcoded


credentials is strictly prohibited.

o Where credential storage is necessary (e.g., for automated jobs), an


approved secure credential vault must be used.

5. Service Account Password Management

o Service account credentials must:

▪ Be strong and meet complexity requirements

▪ Be rotated at least every 90 days

▪ Be restricted in scope and non-interactive unless explicitly


authorized

o All service account usage must be logged and monitored for misuse or
anomalies.

6. Account Lockout and Alerting

o User accounts shall be locked after 5 consecutive failed login attempts.

o Lockout shall be either time-based or require helpdesk intervention.

o Repeated or distributed authentication failures shall trigger automated


alerts to the Information Security Team.

7. Authentication Logging and Auditing

o All authentication attempts (successful and failed) must be logged.

o Logs must include user ID, timestamp, source IP, and system accessed.

o Authentication logs shall be retained for a minimum of 12 months for


auditing and forensic purposes.

8. Review and Compliance

o The Information Security Team shall perform periodic reviews to ensure


compliance with this policy.

o Any deviations or violations shall be addressed under the Enforcement


section of this document.
Document Name Access Management Policy
Classification Internal Use Only

10. ACCESS MONITORING AND REVIEW


1. Logging of Access Events

o All access to critical systems, sensitive applications, and high-risk data


repositories must be logged in real time.

o Logs must include key details such as user ID, timestamp, source IP
address, authentication status, accessed resources, and action performed
(e.g., read, write, delete).

o Logging must capture both successful and failed access attempts.

2. Centralized Log Aggregation

o All access logs must be collected in a centralized Security Information and


Event Management (SIEM) platform.

o The SIEM system shall be configured to perform correlation, alerting, and


anomaly detection for access-related activities.

o Logs must be protected from unauthorized modification and be retained


for a minimum of 12 months.

3. Real-Time Alerts and Monitoring

o Alerts must be generated for abnormal access activities, including but not
limited to:

▪ Privileged access outside approved business hours

▪ Repeated failed login attempts

▪ Access from unrecognized or blacklisted IP addresses

▪ Concurrent logins from geographically inconsistent locations

o The Information Security Team shall monitor these alerts and initiate
incident response procedures as necessary.

4. Periodic Access Reviews

o Access rights for all users must be reviewed on a quarterly basis for critical
systems and semi-annually for non-critical systems.

o Access reviews must be performed by the System/Application Owners in


coordination with the Information Security Team.

o All deviations, excess privileges, or orphaned accounts identified during


the review must be remediated within 7 working days.

5. Dormant and Orphaned Account Management

o Dormant accounts (inactive for 30+ days) must be flagged and reviewed
weekly.
Document Name Access Management Policy
Classification Internal Use Only

o Orphaned accounts (accounts without active owners) must be disabled


immediately and investigated by IT Operations.

o Automated controls must be implemented where feasible to disable


dormant or orphaned accounts.

6. Audit Readiness and Record Retention

o All access logs, review certifications, and remediation actions must be


stored securely and made available during internal or external audits.

o Access-related evidentiary records must be retained in compliance with


the organization's data retention policy and applicable regulatory
requirements.

11. ENFORCEMENT
1. Policy Compliance

o All users, contractors, and third parties with access to [ORG NAME]'s
systems and data are required to adhere strictly to this Access
Management Policy.

o Any deviation, negligence, or unauthorized behavior related to access


controls shall be treated as a policy violation.

2. Violation Categories and Examples

o Violations include, but are not limited to:

▪ Sharing or disclosing user credentials

▪ Unauthorized access to systems or data

▪ Failure to remove access during offboarding

▪ Use of shared accounts without approval

▪ Misuse of privileged access

3. Disciplinary Actions

o Depending on the severity, intent, and impact of the violation, disciplinary


actions may include:

▪ Verbal or written warning

▪ Suspension of access rights

▪ Formal HR disciplinary procedures

▪ Termination of employment or contract

▪ Legal action under applicable laws and regulations

4. Incident Management and Reporting


Document Name Access Management Policy
Classification Internal Use Only

o All suspected or actual access violations must be reported immediately to


the Information Security Team or Security & Compliance Office.

o The incident must be documented and managed as per the


organization's Incident Management Policy.

5. Corrective and Preventive Actions (CAPA)

o Upon conclusion of an investigation, appropriate CAPA measures shall be


taken to mitigate recurrence.

o These may include additional training, technical controls, updates to


workflows, or enhanced monitoring.

6. Appeals and Review Process

o Individuals subject to disciplinary actions may appeal in writing to the


CISO or the designated Appeals Review Committee within 5 working days
of notice.

o The outcome of the appeal process shall be final and documented.

7. Retention of Records

o All enforcement records including investigation reports, logs, evidence,


and communication must be retained securely for a minimum of 24
months, or longer if mandated by regulatory or legal requirements.

12. POLICY EXCEPTIONS


1. Request for Exception

o Any deviation from the defined standards in this Access Management


Policy must be requested formally using the IT Policy Exception Request
Form.

o Requests must contain:

▪ Business justification and scope of the exception

▪ Duration for which the exception is needed

▪ Risk assessment and impact analysis

▪ Any proposed compensating controls

2. Approval Workflow

o All exception requests must follow a structured multi-level approval


process:

Level Approver

Level 1 Department Head / Business Unit Owner


Document Name Access Management Policy
Classification Internal Use Only

Level 2 Application/System Owner

Level 3 Information Security Officer (ISO)

Level 4 Chief Information Security Officer (CISO)

o The CISO holds final authority to approve, deny, or revoke an exception.

3. Documentation and Register Maintenance

o Approved exceptions must be recorded in the Exception Register


maintained by the Security & Compliance Office.

o Each entry must include requester details, approval chain, expiry date,
and applicable controls.

4. Time Bound Validity and Review

o Exceptions must be time-bound and reviewed periodically.

o Default maximum validity shall not exceed 90 days unless formally


extended and reapproved.

o Active exceptions shall be reviewed monthly to ensure continued


relevance and risk containment.

5. Compensating Controls

o If an exception introduces additional risk, mitigating or compensating


controls must be enforced. Examples include:

▪ Enhanced logging and monitoring

▪ Restricting access scope or duration

▪ Additional user validation or supervision

6. Revocation and Audit

o The CISO reserves the right to revoke an exception if:

▪ The associated risk becomes unacceptable

▪ The business justification no longer applies

▪ Evidence of misuse or policy breach is found

o All exceptions shall be subject to review during internal and external


audits.

o Non-compliance with the approved terms of the exception may lead to


enforcement actions as defined in Section 11.
Document Name Access Management Policy
Classification Internal Use Only

13. ESCALATION MATRIX


In case of access management-related issues, violations, or delays in provisioning/de-
provisioning, the following escalation structure shall be followed to ensure timely
resolution and appropriate accountability:

Escalation
Role/Designation Responsibility Contact Mode
Level

Reporting Manager / First-level resolution and Email / Ticketing


Level 1
Team Lead access validation Tool

Review of access
System/Application
Level 2 alignment with business Email / Phone
Owner
roles

Resolution of system-level Internal escalation


Level 3 IT Operations Manager
or technical delays call

Information Security Security assurance and Email / Escalation


Level 4
Officer (ISO) compliance validation Tool

Final authority on policy Direct escalation


Chief Information
Level 5 enforcement and risk via email / formal
Security Officer
mitigation report

• Escalations must be documented through the ITSM tool or equivalent service


desk system.

• Each escalation must include clear description of the issue, impacted


users/systems, time of initial request, and business impact.

• SLAs for resolution based on priority level shall be defined and tracked by the IT
Service Management function.
Document Name Access Management Policy
Classification Internal Use Only

You might also like