Effective User Access Reviews

User access review is a control to periodically verify that only legitimate users have access to applications or infrastructure. During a user access review, an application business or IT owner may discover that users who left the enterprise or transferred to another team in the enterprise continue to have access to applications or infrastructure after their access credentials or privileges should have been removed. This vulnerability can be exploited, resulting in financial and/or reputational loss to the enterprise. However, following some best practices that allow full transparency and ensure that unauthorized users do not have access to an application or system can help mitigate this risk.

User Types

A user is a person who uses an application or tool to achieve a desired business outcome. In the IT world, users can be classified into two broad groups:

Common User Access Risk Scenarios

The following are some common user access risk scenarios that result in users who can access applications or systems to which they should not have access:

User Access Review Best Practices

Implementing user access review best practices can help to eliminate or avoid the mentioned risk scenarios.

Business User Access Review Best Practices
The application business owner is responsible for the effectiveness of the user access review control for business users. The owner can assign a delegate to assist with this activity, but the application business owner remains accountable for this control and any violations.

Best practices that application business owners can implement to help ensure effective user access reviews include:

IT User Access Review Best Practices
IT users need to have access to the application back end to execute their responsibilities. IT users’ access privileges are dependent on their team and role.

The application’s IT owner is responsible for the effectiveness of the user access review control for IT users. The owner can assign a delegate to assist with this activity, but the application’s IT owner remains accountable for this control and any violations. The IT owner is the custodian of the business data. Therefore, after the IT owner completes the access review, he or she must get approval from the application business owner to complete the user access review cycle.

If the application business owner is not an IT expert, the application IT owner can set up a clarification session with the business owner to explain the application and the IT responsibilities. This effort can increase trust between the business team and the IT team and result in a more productive workplace, as improved trust enhances speed and reduces cost.

Best practices that an application’s IT owners can implement to help ensure effective user access reviews include:

Figure 1

Figure 2

Figure 3

Figure 4

Figure 5

Figure 6

Conclusion

During this time of rapid transformation of how IT and business teams work, enterprises expect security to not be compromised for the speed of delivery. The new DevSecOps culture promises secure, high-quality software faster and implies that security is the underlying core consideration through the IT process. Enterprises need to challenge themselves to improve access review by using automation tools and techniques. By adhering to the disciplines discussed previously, enterprises can assure concerned stakeholders that all is well with respect to user access.

Sundaresan Ramaseshan, CISM, ITIL Foundation, ITIL Service Operation
Is an IT supervisor supporting security tools at Ford Motor Private Ltd. in Chennai, India. He has more than 27 years of experience in various IT software development life cycle roles. Ramaseshan continues to enhance his depth of knowledge in the security domain and share some of the successes he observes in day-to-day operations in the hopes that they may benefit the IT security community.