Access Control Procedure

1 Objective

The objective of this document is to establish a procedure and framework for user access management and controlling access to assets and information systems of <Company Name>, in accordance with the Access Control Policy.

2 Scope

This procedure applies to all users and administrators with access to any critical systems in <Company Name>.

3 Access Control Procedure

3.1 Requirements for Access Control

  • A list of systems that are critical from an access control standpoint are listed and maintained in Sprinto App. <Company Name>’s Iinformation Ssecurity Oofficer is responsible for maintaining this list up to date.

  • A list of all critical systems that require access control shall be made available in the Sprinto App in one of the following ways:

  • Integrated Systems – Where possible, the respective administrators of critical systems should integrate the system with Sprinto App for automated and continuous monitoring of access control requirements. Examples of such systems include cloud infrastructure providers (like AWS, Azure), version control systems (like Github, bitbucket), email providers (like Google Workspace, Microsoft O365), HRMS systems, etc.

  • Monitored Systems - Where iIntegrations are not possible, the critical systems should be added to Sprinto App for tracking and monitoring. Adding such systems to Sprinto App to ensure they are monitored is the responsibility of the Information Security Officer.

  • It is the responsibility of the Information Security Officer to ensure that the roles that can get access to each critical system are configured in the Sprinto App.

3.2 Access Provisioning

  • The access to <Company Name> systems should be initiated only after an offer letter, including the terms and conditions of employment, has been formally signed by the employee.

  • By default, all staff membersemployees get access to systems that are configured to be given to all staff. Examples include email providers or internal messaging tools.

  • Access to other systems should be assigned by respective system administrators based on the role matrix defined once the staff memberemployee has been onboarded.

  • Staff membersUsers who are not configured to have access to a particular system will be automatically monitored and alerted by Sprinto App. It is the responsibility of the Information Security Officer to respond to such alerts and ensure the role matrix is updated or the access is removed.

  • For iIntegrated systems, the Information Security Oofficer should ensure that User IDs created in the systems for each user are tagged to their respective company email IDs in Sprinto App to ensure users are identified and tracked continuously.

  • For access provisioning of third-party users (consultants, auditors, vendors/suppliers, etc.), Information Security Officer or Business heads should approve the access. For such users, the system administrator should make sure care should be taken by the system administrator to disable the account after the requirement is over.

3.3 Management of Privileged Access Rights

  • It is the responsibility of system administrators to ensure that the least privilege principle is followed when granting access.

  • As a part of access reviews, the Information Security Officer shall take the help of individual system administrators and business heads to review the privileges assigned to users.

3.4 Management of Secret Authentication Information of Users

  • Where possible, SSO and MFA need to be enabled to reduce reliance on passwords.

  • For critical systems which are integrated with the Sprinto App, it is the responsibility of the Information Security Officer to ensure the MFA status for users with access to systems is monitored continuously on the Sprinto App.

  • In case of discrepancies alerted by Sprinto App, the Information Security Officer should ensure corrective actions are taken immediately.

  • For mMonitored sSystems, the Information Security Officer should make sure that secure login/password management is enabled and that the evidence for it is uploaded on Sprinto App.

3.5 Review of Access Rights

  • Access reviews should be carried out once every quarter by the Information Security Officer with help from respective system administrators for all production systems. For non-production systems, access reviews should be carried out at least annually.

  • The access review for critical systems should be completed within the Sprinto App where possible. For all monitored systems, evidence of performing reviews needs to be uploaded to the Sprinto App.

  • Any corrective step that needs to be taken in case of discrepancies noted should be documented as a part of the access review activity.

  • Review of access rights should also include reviews of privileges assigned to individual users to ensure segregation of duties.

3.6 Removal or Adjustment of Access Rights

  • In case of any termination or change in role, the HR team should inform the system administrators and respective managers to revoke or modify access.

  • On termination of employment, access revocation from all critical systems should be completed within three days from the employee’s last working day.

  • In case of a change in role, the HR team should check and ensure that the roles assigned to the employee in Sprinto App/HRMS are valid or if theyit needneeds to be updated. They should notify respective administrators and managers immediately to update the access if required. The HR team should also notify the Information Security Officer to update the role-based access matrix.

3.7 User Responsibilities

  • Users are responsible for following the organization’s access control policy and procedure.

  • Users are responsible for keeping their passwords confidential.

  • Users are responsible for changing the passwords whenever there is any indication of possible system or password compromise.

  • Incidents relating to passwords/personal authentication information sharing should be reported via the Employee Portal in the Sprinto App.

  • Users shall not leave their system unattended while logged on. They shall lock the system even if they are moving away from the system for a short period of time.

4 Document Security Classification

Company Internal (please refer to the Data Classification policy for details).

5 Non-Compliance

Compliance with this policy shall be verified through various methods, including but not limited to automated reporting, audits, and feedback to the policy owner. Any staff member found to be in violation of this policy may be subject to disciplinary action, up to and including termination of employment or contractual agreement. The disciplinary action shall depend on the extent, intent, and repercussions of the specific violation.

6 Responsibilities

The Information Security Officer is responsible for approving and reviewing policy and related procedures. Supporting functions, departments, and staff members shall be responsible for implementing the relevant sections of the policy in their area of operation.

7 Schedule

This document shall be reviewed annually and whenever significant changes occur in the organization.

Last updated