6.7
IG2 IG3

Centralize Access Control

Asset Type: Users
Security Function: Protect

Description

Centralize access control for all enterprise assets through a directory service or SSO provider, where supported.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Define access control requirements based on least privilege
7
Implement role-based access control (RBAC)
8
Configure access review and recertification process
9
Monitor and audit privileged access usage
10
Select centralized management platform
11
Integrate all in-scope systems and data sources
12
Configure dashboards and reporting

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Inconsistent Access Controls Exploited Across Systems

Confidentiality

Without centralized access control, different systems enforce different policies; attackers target the system with the weakest authentication to gain initial access.

Unable to Enforce Enterprise-Wide Access Policies

Integrity

Decentralized access control prevents consistent enforcement of conditional access, geographic restrictions, or risk-based authentication across all enterprise applications.

Vulnerabilities (When Safeguard Absent)

Decentralized Access Control Without SSO

Without centralized access control via directory service or SSO, each application manages its own authentication independently, creating inconsistent security enforcement.

No Unified Visibility into Access Events

Decentralized access control means authentication events are scattered across individual systems, making it impossible to detect coordinated attacks or anomalous access patterns.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Record Access review/recertification records with sign-off Quarterly
Technical Access control configuration evidence (RBAC settings, group memberships) Reviewed quarterly
Document Governing policy document (current, approved, communicated) Reviewed annually