User Access Review Verification: A Step-by-Step Guide

CA. Ratan Singh Tanwar, CISA, DISA, FAFD, Managing Partner- Tanwar Ratan Singh & Associates CA. Firm, Chartered Accountant
Author: CA. Ratan Singh Tanwar, CISA, DISA, FAFD, Managing Partner- Tanwar Ratan Singh & Associates CA. Firm, Chartered Accountant
Date Published: 21 November 2024
Read Time: 2 minutes

Conducting a User Access Review Verification is an essential process to ensure that only authorized individuals have access to systems and data within an organization.

Below is a step-by-step guide to performing this review effectively:

Preparation

  • Define scope: Determine which systems, applications and data will be included in the review. This could include Active Directory, databases, ERP systems, etc.
  • Identify stakeholders: Engage relevant stakeholders such as IT security, HR and department heads.
  • Gather access control policies: Review the organization’s access control policies to understand the baseline for access permissions.

Collect Access Data

  • Export user access lists: Extract current user access data from the systems within the review’s scope. This data should include user names, roles and access levels.
  • Compile role definitions: Gather documentation that defines roles and the corresponding access privileges. This is important for comparison during the review.
  • Document historical changes: Review logs or documentation of changes to access permissions since the last review.

Review and Analysis

  • Compare against policies: Cross-reference user access lists with access control policies to identify any discrepancies, such as users with excessive permissions or unauthorized access.
  • Analyze role appropriateness: Ensure that users have roles appropriate to their job functions. For example, a user in HR should not have access to financial systems unless specifically required.
  • Identify inactive accounts: Look for accounts that are no longer active but still have access, such as those belonging to former employees.
  • Check for Segregation of Duties (SoD) conflicts: Ensure that no single user has access that violates segregation of duties principles, such as the ability to both initiate and approve transactions.

User Access Verification

  • User verification: Reach out to department heads or system owners to verify that the current access is necessary and appropriate. This could be done through a formal attestation process.
  • Request justification: For any questionable access rights, ask the relevant stakeholders for justification.
  • Document responses: Keep detailed records of all responses and justifications for future reference.

Remediation (Recommendations)

  • Remove unauthorized access: Immediately revoke any access identified as unauthorized or unnecessary.
  • Adjust roles: Modify roles as needed to better align with current job responsibilities.
  • Update documentation: Ensure that all changes made during the review are documented, including reasons for the changes and approvals obtained.

Reporting

  • Prepare a summary report: Create a report summarizing the findings of the review, including any discrepancies found, actions taken, and recommendations for improving access controls.
  • Present to management: Share the report with senior management or the audit committee to inform them of the current state of user access and any risks identified.

Follow-Up

  • Monitor changes: After the review, continue to monitor access changes to ensure that any issues identified are not recurring.
  • Schedule regular reviews: Establish a regular schedule for user access reviews (e.g., quarterly or annually) to maintain continuous control over access rights.
  • Implement improvements: Based on the review findings, improve the access control processes, such as enhancing the approval workflow or automating certain aspects of the review.

By following these steps, you can ensure that your organization’s user access controls are robust, reducing the risk of unauthorized access and enhancing overall security.

Additional resouces