LS-04: External User Account Management
Approval process for external user account changes or user entity responsibility for access controls
Control Description
"Requests to add, modify, and/or remove external user accounts must be approved by an authorized client representative prior to the change being made.
OR
Add the following CUEC:
To the extent user entities have Administrative access to Company terminals and systems, including access via the Internet, each user entity is responsible for establishing and maintaining adequate controls over physical and logical access at the user entity's location. Each user entity is responsible for the provisioning and deprovisioning of access to the in-scope applications and related databases."
Plain Meaning
This control provides two options: either implement an approval process where external user account changes require client representative approval, OR establish that user entities are responsible for managing their own access controls and account provisioning/deprovisioning.
Implementation
Option 1: Client Approval Process
Approval Workflow
- Request Submission: External user submits account change request
- Client Approval: Authorized client representative reviews and approves
- Implementation: IT team implements approved changes
- Documentation: Record all approvals and changes
- Verification: Confirm changes were implemented correctly
Approval Requirements
- All external user account changes require client approval
- Maintain approval records for audit purposes
- Define who qualifies as "authorized client representative"
- Establish timeframes for approval and implementation
Simple Implementation
- Use email-based approval process
- Create approval templates with required information
- Store approval emails in designated folder
- Implement changes only after receiving approval
Option 2: User Entity Responsibility
User Entity Controls
- User entities manage their own access controls
- User entities handle account provisioning/deprovisioning
- Company provides access to systems and applications
- User entities maintain physical and logical security
Implementation Approach
- Document user entity responsibilities clearly
- Provide access management tools to user entities
- Establish communication channels for access requests
- Monitor user entity compliance with security requirements
Key Success Factors
- Clear Process: Well-defined approval or responsibility assignment
- Documentation: Maintain records of all account changes
- Timeliness: Implement changes within reasonable timeframes
- Verification: Confirm changes were implemented correctly
- Audit Trail: Complete record of approvals and actions taken
Common Pitfalls to Avoid
- No Approval Process: Missing formal approval for account changes
- Unclear Responsibilities: User entities don't understand their obligations
- No Documentation: Missing records of approvals and changes
- Delayed Implementation: Changes not implemented promptly
Related Controls
Access Management
- LS-05: Access Review: Regular access reviews and audits
- LS-07: Privileged Access Management: Privileged access controls
- LS-14: Administrative Access Restrictions: Administrative access controls
- LS-22: Asset Management: Asset tracking and access management
Change Management
- CM-1: Source Code Access Review: Code access authorization
- CM-3: Change Authorization: Change authorization procedures
- CM-11: Change Documentation: Access change documentation
- CM-12: Change Approval Process: Access approval workflows
Monitoring and Logging
- COM-02: Centralized Logging Solution: Access activity logging
- COM-04: Log Monitoring and Alerting: Access monitoring and alerts
- COM-05: Log Access Controls: Log access authorization
Data Security
- DS-03: Data Classification and Handling: Data access based on classification
- DS-04: Data Loss Prevention: DLP based on access controls
- DS-06: Data Retention and Disposal: Access to data retention systems
Incident Response
- IR-01: Monthly Incident Review: Access-related incident reviews
- IR-02: Incident Management Process: Access incident response
Risk Assessment
- RA-01: Internal Control Audits: Access control audits
- RA-02: Risk Assessment Procedures: Access risk assessment
Third-Party Management
- TPM-02: Third-Party Access Controls: Third-party access management