IT System Access and Re-Certification Policy

screenshot of the first page of IT System Access and Re-Certification Policy
Guidelines for Securing Digital Infrastructure

Learn about the guidelines for securing digital infrastructure and maintaining proper system access security with this policy. This tool provides clear definitions of roles, user access rights and responsibilities, as well as procedures for adding, changing and deleting employees' system access rights.

It also outlines a systematic approach for reviewing and approving changes to system access security using an IT issue-tracking application and describes an annual re-certification process, which ensures that users are authorized for the correct function or transaction in the system. Overall, this policy offers valuable insights into the company’s efforts to maintain robust system security administration. 

According to this policy:

  • The process owner is typically a manager who is responsible for a business function.
  • Process owners should be responsible for defining the system functions that users require to complete their job responsibilities.
  • The process owner should authorize users to access those system functions for all locations before IT personnel enables access.

Free Trial

Sign up for a free, no-obligation trial to start exploring our timesaving, valuable resources.