Skip to main content
Completing Access Management
Fabiola Munguia avatar
Written by Fabiola Munguia
Updated over 5 months ago

Access Management refers to the careful control and monitoring of accesses granted to high risk software and tools utilized within an organization. This practice is pivotal in ensuring only authorized individuals can access sensitive data, thereby shielding the company from potential threats and breaches. This process ensures that vendor access is properly granted, monitored, and revoked when no longer needed.

For audits, it shows that the organization carefully manages third-party access and demonstrates a proactive approach to managing vendor-related risks.

The first step in the execution of access management is to document and review all accesses to software identified as critical and high-risk during your Vendor Risk Management exercise. Tools like Personio, Jira, Hubspot, GitHub, Slack, and Notion often fall into this category. It is recommended to carry out these reviews at least quarterly. Broadening this to encompass tools utilized in various departments such as development, product, HR, communication, and sales, though optional, is a good practice.


What accesses do I need to document?

Access management primarily focuses on human accesses as they are often associated with a higher degree of risk and unpredictability compared to machine accesses, which generally operate within fixed parameters and thus pose a lower security risk.


How to work on access management

Exporting user list

  1. In Secfix, navigate to the Vendors section

  2. Sort by Risk level

  3. Copy the vendors that have the High risk assigned

  4. For each high risk vendor, export the user list (preferably in .csv). You should be able to export it directly from the vendor's application

Spreadsheet structuring

Access management template was shared with you by your CSM and can be found in the Supporting Docs folder on your shared Google/OneDrive.

  1. Open the Access management template

  2. Replicate the ‘Customer Template’ tab for each high-risk vendor identified

  3. Customize each tab with the respective vendor's name for easy identification

Importing user list

  1. Under each vendor-specific tab, incorporate the user list exported from the vendor's application

  2. Click on File and then Import. Select Append to current sheet

  3. Align and organize the data to resonate with the template’s structure

Filling the remaining columns

In each vendor tab, go ahead and populate the remaining columns according to your organization’s stipulated structure

Reporting necessary changes

  1. Use the ‘Findings’ column to note down necessary adjustments regarding user roles

  2. Be meticulous, enlisting all the crucial details to foster informed decisions during the review meetings

Summary report

  1. Work on the "Report Summary" tab within the same spreadsheet

  2. Transfer the insights gathered in individual vendor tabs into this consolidated report

Version history

  1. Craft a “Version History” tab to encapsulate all the alterations made to the spreadsheet

  2. Log every update along with the date and a succinct description to foster a transparent change management process

🤝 Access review meeting

On a quarterly basis you should have the access review meeting and document it in your Manual evidence.

You will also need to demonstrate documents or reports from a recent periodic access review of all in-scope components, including data stores, cloud infra, version control system, etc. It can be in a form of a ticket, email with findings, etc.

Did this answer your question?