<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon

The Annual Access Audit Survival Guide

StrongDM manages and audits access to infrastructure.
  • Role-based, attribute-based, & just-in-time access to infrastructure
  • Connect any person or service to any infrastructure, anywhere
  • Logging like you've never seen

So, you’ve decided to conduct an annual access audit. Now comes the obvious question: where do I start? Just like you wouldn’t embark on a mountain climbing excursion without a clear understanding of the terrain and gear you need, the starting point for an annual access audit requires an understanding of the process, people, and tools you’ll need to get started. Let’s go!

Step 1: Role Discovery

The starting point for every access audit is identifying and validating the roles you have in your organization. This process defines:

  • The company's employee structure
  • Each team's structure
  • Initial analysis of access available to each role

Technical staff, such as the IT or infrastructure engineering team, are usually responsible for technology roles and planning. However, everyone needs to be involved in this process. If the organization doesn't take the time to plan access upfront, it may end up providing too little or too much access to employees, which can lead to security issues.

While it may be easy to start with job titles and access needs, it is worth noting that there will be cases where a specific job needs the access to multiple roles. 

Step 2: Inventory your stack

After you’ve compiled the full list of roles in your organization, you’ll need to pull together a full list of the tools and technologies in your tech stack. If you skip this step, you’ll find that tools may exist outside of security and IT purview, increasing your overall breach surface.

Similar to the above, this is a collaborative process that defines:

  • Tools and technologies in your tech stack
  • Current and future usage of each tool
  • Understanding of data and sensitivity of each tool

Step 3: Access: Role Alignment

Once you've completed the discovery phase, you must align each role to the required access. The key questions to ask in this phase are:

  • Does this role really need access to this tool?
  • Is every tool still in use? What can be retired or deprecated?
  • What is the appropriate level of access based on the sensitivity of data or the criticality of each tool?

Infrastructure administrators must identify who has access to all resources, including files, databases, Kubernetes clusters, and servers, for example. This step is foundational to implementing just-in-time access and zero-standing privileges. The information gleaned from this step will help define access and when it’s needed. 

Aligning Access: Slices, Roles, And Test Cases

Users need different access to various systems and information to do their jobs. Slices are the specific use cases for access, Roles are the groups of Slices related to specific job responsibilities, and Test Cases are the plan you make to ensure everyone has the access they need to do their jobs safely and securely. Let’s break those down further:

  • "Slices" are like the tools and equipment needed for each part of the climb. Each Slice is a specific task or use case that requires access to certain systems or information. 
  • "Roles" are like each climber's jobs or responsibilities on the mountain. Different people in an organization have different Roles based on their job responsibilities. Each Role is a group of Slices related to a specific task or responsibility. For example, the IT administrator might have a Role that includes Slices for managing servers and databases. In contrast, the marketing team might have a Role that includes Slices for creating and managing campaigns.
  • "Test Cases" are like practice hikes you would run to prepare for scaling a mountain. When setting up access audits, you must map out who needs access to what systems and why. Test Cases are real-world examples that specify who needs access to what information or systems and why they need that access. Test Cases validate the Slices and Roles and ensure everyone has the access to do their jobs safely and securely.

Access discovery can take time, especially if your organization grows rapidly, resulting in a complex and distributed IT infrastructure. However, getting a clear picture of your infrastructure and performing a yearly check-up is essential to reducing risk.

Part 4: Building your annual access muscles 

Conducting an access audit for the first time can be daunting, but there are steps you can take to simplify the process. Start by setting clear objectives and goals for the audit, such as identifying all the access points to your infrastructure or assessing the effectiveness of your existing access management policies. Establish clear milestone goals on the calendar and track your progress against those goals.

After conducting the audit, update it regularly to reflect any changes in your infrastructure or workforce. For instance, if you onboard new employees or migrate to a new cloud provider, you must update your access policies accordingly. Regularly performing an audit ensures that you're always up-to-date with the latest changes in privileges and assures the team that the access management policies remain effective.

Need Help Getting Started?

The annual access audit is a best practice for IAM teams. 

If you need help getting started, we have a webinar for that. Or if you learn more by doing, we have a free access workbook to help you get the ball rolling. 

​​This workbook includes the following:

  • The steps required to run a Role & Access Discovery project
  • Tabs that you can use to track the who, what, roles, and slices of roles and access
  • Example test cases that show how you can attempt to match the case to the best role

Once you wrap up your annual access audit, you’ll need to consider how you implement the changes. At this point in the process, many enterprise organizations seek the help of a Zero Trust Privileged Access Management (PAM) platform (like ours 😎) to help manage all of that access. We can implement and execute the necessary changes based on your findings. Think of us as your seasoned guide to editing access; a knowledgeable and experienced local who knows the environment like the back of their hand. Book a demo. 


About the Author

, Content Manager, Angela supports the marketing team by developing creative content that helps StrongDM tell its story in creative and authentic ways. Experienced in the advertising agency space and the consulting world, Angela spent her early career years serving as a client-facing writer and project manager for brands large and small. Her specialties range from brand development and strategic campaign planning to social media execution and long-form content production. Angela obtained her Bachelor of Science in Business Administration from the University of Tulsa. She majored in Marketing and Management and completed minors in Advertising and Communications during her time at TU. To contact Angela, visit her on LinkedIn.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

IGA vs. PAM: What’s the Difference?
IGA vs. PAM: What’s the Difference?
IGA (Identity Governance and Administration) manages user identities and access across the organization, ensuring proper access and compliance. PAM (Privileged Access Management) secures privileged accounts with elevated permissions by using measures like credential vaulting and session monitoring to prevent misuse. While IGA handles overall user access, PAM adds security for the most sensitive accounts.
How To Monitor and Securely Access IoT Devices Remotely
How To Monitor and Securely Access IoT Devices Remotely
Internet of Things (IoT) devices form the backbone of many modern businesses, facilitating operations, collecting valuable data, and enhancing efficiency. However, the widespread deployment of these devices creates numerous entry points for potential attackers. Without robust security measures, you risk exposing critical systems and sensitive information to malicious actors.
What Is Defense In Depth (DiD)? Strategy and Implementation
What Is Defense In Depth (DiD)? Strategy & Implementation
Traditional security measures like simple virus protection, firewalls, and web and email filtering are no longer sufficient to safeguard against the sophisticated tactics used by modern cybercriminals. This heightened complexity means you must implement advanced defense mechanisms that go beyond basic protections, ensuring a resilient and adaptive cybersecurity posture.
MFA Fatigue Attack: Meaning, Types, Examples, and More
MFA Fatigue Attack: Meaning, Types, Examples, and More
This article investigates MFA fatigue attacks. We'll explain how they work, why they're effective, and who they typically target. We'll also provide real-life examples to help your team detect and prevent these threats. You'll leave with a clear understanding of MFA fatigue attacks and tips on how to shore up your cloud security to defend against them.
What Is User Provisioning? How It Works, Best Practices & More
What Is User Provisioning? How It Works, Best Practices & More
User provisioning is the process of managing user access within an enterprise. It involves creating, managing, and deprovisioning user accounts and access rights across various systems and applications. This includes setting up accounts, assigning roles and permissions, and managing identities.