skills/goldenzero/skills/access-control-review

access-control-review

SKILL.md

Access Control Review

Overview

Evaluate access control risks including user access management, privileged access governance, segregation of duties (SoD) conflicts, and access certification effectiveness. This skill applies the FFIEC IT Examination Handbook (Information Security booklet), NIST Cybersecurity Framework (PR.AC), SOX Section 302/404 requirements for IT general controls, and COSO Principle 11 (general controls over technology) to assess the adequacy of logical access controls in financial institutions.

When to Use

  • Reviewing user access provisioning and de-provisioning processes
  • Assessing privileged access management programs (PAM)
  • Identifying and remediating segregation of duties conflicts
  • Evaluating access certification/recertification campaigns
  • Analyzing access-related audit findings or regulatory examination results
  • Assessing access controls as IT general controls (ITGCs) supporting SOX-relevant applications

Required Inputs

  • Access data: User access listings, role assignments, entitlement details, privileged account inventories
  • SoD matrix: Defined conflict rules, toxic combinations, mitigating controls
  • Application inventory: In-scope applications, criticality classification, SOX relevance
  • Process documentation: Access provisioning workflows, approval chains, certification procedures
  • Audit/exam findings: Prior access-related findings, remediation status, MRA/MRIA tracking
  • Organizational data: Org charts, job descriptions, reporting hierarchies, recent transfers/terminations

Methodology

Step 1: Access Governance Framework Assessment

Evaluate governance against FFIEC and NIST expectations: policy framework comprehensiveness, RBAC implementation with roles aligned to job functions, least privilege enforcement, application and data owner accountability, risk committee reporting, and alignment to NIST CSF PR.AC subcategories (PR.AC-1 through PR.AC-7).

Step 2: Access Lifecycle Management Review

Assess the end-to-end access lifecycle:

Provisioning: Documented business justification, application/data owner approval, role-based grants (not ad-hoc), automated provisioning where feasible, and pre-grant SoD conflict checking.

Modification: Role changes trigger access reviews, accumulated access from prior roles reviewed and revoked (access creep prevention), temporary/emergency access has defined expiration.

De-provisioning: Termination triggers same-day revocation, HR system feeds drive automated de-provisioning, shared accounts transferred or disabled, contractor access revoked on engagement end.

Key KPIs: Provisioning ≤3 days, termination revocation same-day, orphan accounts 0%, transfer completion ≤5 days.

Step 3: Privileged Access Management (PAM) Assessment

Evaluate per FFIEC and NIST SP 800-53 (AC-6): complete privileged account inventory and classification, documented justification and ownership, MFA and session recording requirements, activity logging with anomaly detection, quarterly review frequency, service account password rotation, and documented break-glass procedures with post-use review.

Step 4: Segregation of Duties (SoD) Analysis

Define toxic combinations for key processes:

Process Conflicting Functions
Accounts Payable Vendor master maintenance + Payment approval
General Ledger Journal entry creation + Journal entry approval
Wire Transfers Wire initiation + Wire release
Lending Loan origination + Credit approval
User Administration Access provisioning + Access approval
Treasury Trade execution + Trade settlement + Trade recording

Extract entitlements, map to SoD rules, identify cross-application conflicts, assess compensating controls, and quantify conflicts by severity (Critical=no controls, High=weak, Medium=adequate, Low=strong).

Step 5: Access Certification Review

Evaluate certification effectiveness: scope covers all in-scope and SOX-relevant applications, frequency commensurate with risk (critical=quarterly, standard=semi-annual), certifiers are application/data owners, certifiers receive sufficient information (entitlements in business terms, last login dates), rubber-stamping indicators analyzed (100% approval, minimal review time), revocation follow-through confirmed, and results retained for audit.

Step 6: SOX ITGC Access Control Assessment

Evaluate: all SOX-relevant applications in scope, separation of dev/test/production access, direct database access controls and monitoring, administrator OS access review, design adequacy testing, and operating effectiveness test results for provisioning, de-provisioning, and certification controls.

Step 7: Findings, Risk Rating, and Recommendations

Classify findings by severity, map to regulatory requirements (FFIEC, NIST, SOX), provide actionable recommendations with effort estimates, distinguish quick wins from strategic improvements, and estimate residual risk from unmitigated gaps.

Output Specification

# Access Control Review Report

## Executive Summary
[Maturity assessment, key findings, critical recommendations]

## Access Governance Maturity
| Domain | Maturity (1-5) | Key Gaps |

## Detailed Findings
[Critical, High, Medium/Low findings with risk impact, regulatory reference, remediation]

## SoD Conflict Summary
| Process | Conflicts Identified | With Compensating Controls | Unmitigated |

## Privileged Access Summary
| Account Type | Count | Compliant | Non-Compliant | Key Issues |

## Access Certification Effectiveness
| Application | Certification Rate | Revocation Rate | Rubber-Stamp Indicators |

## Remediation Roadmap
| Finding | Priority | Remediation | Owner | Target Date | Effort |

Analysis Framework

Level Description
1 — Initial Ad-hoc access management, no formal processes, pervasive SoD conflicts
2 — Developing Basic provisioning/de-provisioning, partial RBAC
3 — Defined RBAC implemented, SoD rules defined, periodic certifications
4 — Managed Automated lifecycle, continuous SoD monitoring, PAM deployed
5 — Optimized Risk-adaptive controls, real-time analytics, zero-trust architecture

Examples

Example 1 — SoD Conflict Finding: "Analysis of SAP entitlements identified 23 users in Finance with concurrent access to FB01 (Post Journal Entry), FB02 (Change Journal Entry), and FBRA (Reset Cleared Items) — allowing a single user to create, modify, and reverse journal entries without approval. 18 of 23 users have no compensating controls. This represents a significant deficiency in COSO Principle 10 and a SOX ITGC gap. Recommend: immediate remediation for unmitigated users, compensating detective controls (daily exception report reviewed by Controller) for those requiring dual access with documented justification."

Example 2 — Privileged Access Finding: "The core banking platform (FIS Horizon) has 47 system admin accounts: 12 are shared/generic without individual accountability, and 3 belong to employees terminated 30-90 days ago. No session recording or just-in-time elevation is implemented. Recommend: (1) deactivate orphaned accounts immediately, (2) eliminate shared accounts within 60 days, (3) deploy PAM solution within 180 days."

Guidelines

  • Prioritize systems processing customer PII and financial data
  • Consider cross-application SoD conflicts, not just within-application entitlements
  • 100% SoD elimination may not be feasible; focus on adequate compensating controls
  • Consider system integration and SSO impacts on access control boundaries
  • Evaluate service account proliferation as a growing attack vector
  • Document assessments for regulatory examination readiness

Validation Checklist

  • Access governance assessed against FFIEC and NIST requirements
  • Full access lifecycle evaluated: provisioning, modification, de-provisioning
  • Privileged account inventory complete with ownership and justification
  • SoD analysis performed for all critical business processes
  • Compensating controls assessed for effectiveness
  • Certification effectiveness analyzed with rubber-stamping indicators
  • SOX ITGC access controls assessed for design and operating effectiveness
  • Findings mapped to regulatory requirements and COSO principles
  • Remediation roadmap includes priorities, owners, timelines, and effort
Weekly Installs
2
First Seen
Feb 27, 2026
Installed on
opencode2
gemini-cli2
claude-code2
github-copilot2
codex2
kimi-cli2