6.1
IG1 IG2 IG3

Establish an Access Granting Process

Asset Type: Users
Security Function: Protect

Description

Establish and follow a process, preferably automated, for granting access to enterprise assets upon new hire, rights grant, or role change of a user.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Draft policy/procedure document
7
Obtain stakeholder review and approval
8
Communicate to affected personnel
9
Schedule periodic review and updates

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Excessive Access Granted to New Hires

Confidentiality

Without a formal granting process, new employees receive access by cloning another user's permissions, inheriting unnecessary privileges accumulated through that user's role changes.

Unauthorized Access During Role Transitions

Confidentiality

Users changing roles accumulate access from both old and new positions because no structured process ensures previous access is reviewed when new access is granted.

Vulnerabilities (When Safeguard Absent)

No Formal Access Granting Process

Without a defined process for granting access, provisioning decisions are ad-hoc, inconsistent, and not tied to verified business need, leading to over-provisioning.

No Approval Workflow for Access Requests

Without a structured approval process, access is granted based on informal requests without management authorization or documentation of the business justification.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Document Governing policy document (current, approved, communicated) Reviewed annually