CIS Control 6.2 Establish an Access Granting Process
The Center for Internet Security (CIS) Controls are a trusted framework for helping organizations improve their cybersecurity posture, and Control 6.2 is no exception.
Safeguard 6.2 highlights the importance of having a well-defined, preferably automated, process for revoking access to enterprise assets. While it sounds simple, this safeguard is crucial for reducing the risk of unauthorized access, especially during sensitive transitions like terminations or role changes.
Here’s what it means in practice:
- Immediate Action: The process ensures that accounts are disabled immediately upon an employee's termination, preventing lingering access.
- Rights Revocation: When a user’s access requirements change—whether due to role changes or specific rights no longer being needed—those permissions should be promptly revoked.
- Audit Preservation: Instead of deleting accounts outright, accounts should be disabled to maintain critical audit trails for forensic and compliance purposes.
If you’re using tools like Microsoft Active Directory (on-premises or Azure AD), Okta, or other Identity and Access Management (IAM) systems, automating this process is likely already within your reach. Integration with your HR system can further streamline access revocation during terminations or role transitions.
Why does this matter? Delayed or inconsistent access revocation is a major security risk. Former employees or users with unnecessary privileges could inadvertently or maliciously access sensitive systems. Automating this process reduces that risk, ensures compliance, and gives your organization peace of mind.
To recap, CIS Control 6.2 is all about ensuring you have a reliable and efficient process to revoke access immediately and effectively. Whether it’s due to termination, rights revocation, or a role change, the safeguard ensures that only the right people maintain access to enterprise assets while preserving your audit trails.