Access Control Management Procedure (AC-PROC-004)

1. Purpose

To define the process for requesting, approving, implementing, modifying, and revoking user access to company information systems, ensuring the principle of least privilege is enforced.

2. Scope

This procedure applies to all workforce members, managers, system owners, and IT personnel involved in the lifecycle of user access to all company information systems.

3. Overview

This procedure covers the end-to-end management of user access, from initial provisioning and modification to final revocation upon termination. It ensures that all access changes are properly authorized, implemented, and documented to maintain a secure environment.

4. Procedure

4.1 Access Provisioning/Modification

Step Who What
1 Requestor (User or Manager) Submits an access request ticket specifying the system and required permissions.
2 Manager Approves the request in the ticket, verifying the business need.
3 System or Information Owner Provides final approval, ensuring the request aligns with data classification and security policies.
4 IT Department / System Administrator Provisions the approved access.

4.2 Access Revocation (Termination)

Step Who What
1 Human Resources Notifies the IT Department of a workforce member’s termination.
2 IT Department Immediately revokes all logical and physical access for the terminated workforce member.
3 IT Department Confirms completion of all revocation tasks and updates relevant records.

5. Standards Compliance

Procedure Step(s) Standard/Framework Control Reference
4.1, 4.2 SOC 2 CC6.1, CC6.3
4.1, 4.2 HIPAA 45 CFR § 164.308(a)(3)(ii)(C), 45 CFR § 164.308(a)(4)

6. Artifact(s)

A completed access request ticket showing the full request, approval chain, and implementation details. For terminations, a record of the HR notification and IT’s confirmation of access revocation.

7. Definitions

  • System Owner: The individual or group responsible for the overall procurement, development, integration, modification, operation, and maintenance of an information system.
  • Information Owner: The individual with statutory or operational authority for specified information and responsibility for establishing the controls for its generation, collection, processing, dissemination, and disposal.

8. Responsibilities

Role Responsibility
Requestor Initiates access requests with a clear justification for the required permissions.
Manager Provides initial approval for access requests, confirming the business need for their direct reports.
System/Information Owner Provides final approval for access, ensuring it aligns with security and data handling policies.
IT Department/System Administrator Implements the approved access changes and is responsible for the timely revocation of access upon notification.
Human Resources Manages the employee lifecycle and provides timely notification of terminations to the IT Department.