Back to Blog

Step 5 – User Access Review Best Practices: Increase Maturity

By Finosec

February 2, 2023

Get notified on new insights from Finosec now!

Be the first to know about new Finosec blogs to grow your knowledge of the cybersecurity governance industry today!

Speak with an expert blog ad green

Step 5 is the final step in the User Access Review Best Practices series. The goal of this step is to focus on increasing standardization to develop a more mature and routine approach to user access reviews by focusing on three key areas.

  1. Roles and baseline permissions
  2. Standardized onboarding processes
  3. Procedures to track and account for changes and exceptions.

Step Five: Increase Maturity

In the previous steps, you inventoried and mapped your systems, identified the relative risk of the different systems, rated system risk, and identified those with higher risk. From there, you learned to review the roles, identify the system access each role needs, and how to properly address new and terminated accounts.

Now, it’s time to take what you’ve learned and build a streamlined process that keeps your institution safer while making your job simpler.

Use Security Groups

You should develop a comprehensive list of the baseline permissions per system for each job role or function, making sure the access to be granted is consistent with the standard of least privilege. This is also where you need to identify the privileged access requirements. It may even make sense to create a special group for these elevated rights for ease of management. Be on guard for permission creep and red flags, such as a single user being able to make and approve their own change in a system. Your diligence in this process is a good way for you to reduce overall risk.

Once completed, create security groups to match the job roles or functions you’ve defined. By using group permissions, you can easily add and remove accounts and know what permissions are being altered.

Where do I start?

The path to easy permissions management begins with a Role & Access Matrix that consists of the following items:

  • Roles/Functions
  • The primary function of the role
  • Systems & permissions the role requires
  • Security Groups required for the role

Using this matrix, you can establish the procedures needed to maintain accurate and verifiable permission provisioning for your accounts.

Establish standard onboarding procedures

By utilizing security groups for each job role or function, you can standardize your onboarding process, making it easier, reducing follow-up helpdesk requests for permissions that were overlooked, and setting your new employees up for success.

Work with your HR team, so that job roles and functions are standardized allowing for a smooth process for provisioning new users. For example, HR notifies IT that a new teller is starting on a certain day. IT can then provision that account at the right time and add the user to the teller security groups confidently knowing that they will have all the access they need.

Establish job change and termination procedures

Utilizing the Role & Access Matrix and your security groups benefits your job change and termination procedures, as well. For terminations, you’ll have confidence in knowing what systems to remove the user from and not miss one. For job changes, you can add them to their new security groups and remove them from the security groups and systems no longer needed. This ensures you don’t leave leftover excess permissions along the way.

What about one-offs?

A more complex change case is when an employee, for whatever reason, must be given temporary access to one or more systems. There must be a process in place to manage and handle these temporary situations, so they aren’t forgotten and become permanent.

One way to track these is by using a user variance management process. This can be a separate log or built into your change management program. Be sure that every temporary access request has a defined end date. Then, set reminders to remove the access at the appropriate time. A review of the user access variance log should be completed routinely to ensure that a temporary elevation in permissions doesn’t become an accidental permanent change.

Want more information?

This is the final step of a five-step improved UAR process. If you would like, you can review the previous blogs here:

Or, if you’re already tired of outdated processes to complete user access reviews, you should contact FINOSEC today. We’d love to work alongside you to simplify your user access review process and make them easier than ever!

Speak with an expert blog ad green

More from Finosec

Integrating FFIEC Authentication Guidance: A Blueprint for Your Next Exam With Insights from Recent Regulatory Actions

Integrating FFIEC Authentication Guidance: A Blueprint for Your Next Exam With Insights from Recent Regulatory Actions

The Federal Financial Institutions Examination Council (FFIEC) Authentication Guidance update in August 2021 has marked a significant step towards enhancing authentication and security access measures within financial institutions. This update expanded upon previous handbooks from 2005 and 2011, emphasizing a broader scope that now includes employees, third-party vendors, and system-to-system communications via APIs.

The Best Defense Against Ransomware

The Best Defense Against Ransomware

Beth Sumner, our VP of Customer Success, recently had the opportunity to discuss ransomware attacks and the importance of community bankers staying vigilant against these crimes in Independent Banker.  While the number of ransomware attacks continues to increase, so do the sums demanded by the attackers.

Succession Planning: Essential for Sustaining Information Security

Succession Planning: Essential for Sustaining Information Security

In today’s world where cyber threats evolve rapidly, the challenge of replacing an Information Security Officer (ISO) underscores a critical issue: the cybersecurity job market is scorching, yet talent is scarce. This gap has turned recruitment into a high-stakes game for financial institutions, where the departure of an ISO exposes vulnerabilities and regulatory risks. With remote work expanding the competition for skilled professionals, the importance of strategic succession planning has never been more acute, ensuring that institutions remain fortified even in the face of staffing changes.

Partnering for Peace of Mind and Effective Oversight

Partnering for Peace of Mind and Effective Oversight

Pendleton Community Bank, a $700 Million Dollar Bank with 133 Employees in Franklin, WV, led by CEO Bill Loving, faced a critical challenge when their Information Security Officer departed, leaving a significant void in their oversight capabilities. Their goal was clear: establish an effective process for information security governance and cybersecurity oversight to ensure compliance and peace of mind.

Talk To An Expert Now
Talk To An Expert Now 770.268.2765