Control Requirements
LS-24: Quarterly Access Reviews
Quarterly review of access to network, applications, and databases with issue resolution
Control Description
On a quarterly basis, the Company performs a review of access to the network, in-scope applications, and related databases to help ensure that user access is appropriate. Any issues identified as a result of these reviews are communicated and resolved.
Plain Meaning
This control requires organizations to conduct quarterly reviews of all user access to ensure that access is appropriate and necessary. Any issues found during these reviews must be communicated to relevant parties and resolved.
Implementation
Access Review Process
Review Requirements
- Conduct access reviews every quarter (3 months)
- Review all user access to network, applications, and databases
- Identify inappropriate or unnecessary access
- Communicate issues to relevant managers and users
- Resolve identified issues within reasonable timeframe
- Document all review activities and resolutions
Review Scope
- Network access and permissions
- Application access and user roles
- Database access and privileges
- Administrative access and privileges
- External user access and permissions
Implementation Approach
Review Process Options
- Manual Reviews: , manually review access lists
- Automated Tools: Use identity management tools for larger organizations
- Hybrid Approach: Combine automated tools with manual verification
- Manager Reviews: Have managers review their team's access
Simple Implementation Steps
- Generate Access Reports: Create comprehensive access listings
- Distribute to Managers: Send access reports to appropriate managers
- Review Access: Managers review their team's access for appropriateness
- Identify Issues: Document any inappropriate or unnecessary access
- Communicate Issues: Notify relevant parties of identified issues
- Resolve Issues: Remove or modify inappropriate access
- Document Results: Record all review activities and resolutions
Issue Resolution Process
- Immediate Issues: Resolve critical security issues immediately
- Standard Issues: Resolve within 30 days of identification
- Complex Issues: Document timeline for resolution of complex issues
- Verification: Confirm that issues have been properly resolved
Key Success Factors
- Regular Schedule: Consistent quarterly review process
- Comprehensive Coverage: Review all access points and users
- Manager Engagement: Active participation by managers in review process
- Timely Resolution: Prompt resolution of identified issues
- Documentation: Complete records of all review activities
Common Pitfalls to Avoid
- Irregular Reviews: Not conducting reviews on schedule
- Incomplete Coverage: Missing some access points or users
- No Follow-up: Not resolving identified issues
- Poor Documentation: Missing records of review activities
Related Controls
- LS-10: External user access review
- LS-22: Manager approval for access requests
- LS-25: Valid user IDs and passwords required