3.3
IG1 IG2 IG3

Configure Data Access Control Lists

Control Group: 3. Data Protection
Asset Type: Data
Security Function: Protect

Description

Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Define access control requirements based on least privilege
7
Implement role-based access control (RBAC)
8
Configure access review and recertification process
9
Monitor and audit privileged access usage

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Unauthorized Data Access by Overprivileged Users

Confidentiality

Users with excessive file system, database, or application permissions access sensitive data beyond their need-to-know, increasing insider threat risk and breach blast radius.

Lateral Movement via Open File Shares

Confidentiality

Attackers who compromise a single user account gain access to broadly shared file systems and databases lacking access control lists, enabling rapid data harvesting.

Data Tampering by Unauthorized Parties

Integrity

Without proper access control lists, unauthorized users or compromised accounts can modify critical business data, financial records, or configuration files.

Vulnerabilities (When Safeguard Absent)

Overly Permissive Data Access Permissions

Without need-to-know-based access control lists, data repositories default to broad access, granting users permissions far exceeding their role requirements.

Inconsistent Access Controls Across Data Stores

Without a policy-driven ACL configuration, access permissions vary inconsistently across file systems, databases, and applications with no unified enforcement.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Record Access review/recertification records with sign-off Quarterly
Technical Access control configuration evidence (RBAC settings, group memberships) Reviewed quarterly
Document Governing policy document (current, approved, communicated) Reviewed annually