Back to Blog

Challenges of Manual User Access Reviews in Community Financial Institutions

By Beth Sumner

August 1, 2024

Get notified on new insights from Finosec now!

Be the first to know about new Finosec blogs to grow your knowledge of the cybersecurity governance industry today!

When I first entered the banking world, user access reviews were much more straightforward. Spreadsheets were used to capture the basics of who had network and core application access. There was a page in each employee’s file listing the keys and codes they had, and to see what had changed in core reports, you’d lay two versions of the same report side by side and use a yardstick to compare them. It was a time-consuming and error-prone process, but back then, it worked.

However, as application risk, system sprawl, and interconnectedness have evolved, this manual format has become increasingly impractical. Ensuring that only the right people have access to the right information is now more critical and complex than ever to keep our institutions safe.

Major Risks of Manual User Access Reviews:

  • Extensive Reports: Core processors generate massive permissions reports that are time-consuming and prone to errors.
  • Shadow IT: Unmonitored applications and devices can create security vulnerabilities.
  • Keys and Codes: Manual tracking of physical access controls can lead to unauthorized access.
  • Spreadsheet Challenges: Spreadsheets and vLookups provide basic information but fail to support complex, detailed reviews.
  • Terminated Employees: Ensuring that former employees’ access is promptly revoked can be overlooked.
  • Reviewer Risk: Reviewers need deep knowledge of applications, sufficient time, and an understanding of the reporting.

User access reviews are about making sure employees have the appropriate level of access to your institution’s systems and information. This task becomes especially challenging when dealing with core processors, which generate extensive permission reports that can be hundreds of pages long. Manually checking each user’s access is not only time-consuming but also prone to errors. Core processors generate massive permissions reports, and manually verifying each person’s access against their job duties is daunting. This can easily lead to unauthorized access or missed updates.

Shadow IT, where employees use applications and devices that the IT department doesn’t know about or hasn’t approved, adds another layer of risk. These “shadow” applications are often not part of the official review process and can go unnoticed. I recently wrote a blog about Shadow IT that dives deeper into this issue. When employees use software tools without informing IT, it creates security vulnerabilities since these applications and their access aren’t monitored.

Beyond digital access, managing physical access to your bank’s locations and secure areas is crucial. “Keys and codes” refer to things like branch keys, vault keys, alarm codes, and server room door codes. Often, these are tracked on paper in employees’ personnel files, adding another layer of complexity. Manually tracking who has what key or code can be cumbersome and inefficient, and outdated or misplaced records can lead to unauthorized access, posing serious security threats.

Most community financial institutions I’ve worked with rely on extensive spreadsheets and use vLookups for user access reviews. While these spreadsheets can provide basic information on who has access to what systems, they fall short when it comes to more complex and detailed reviews needed for critical systems. Spreadsheets don’t tie together seamlessly, leading to gaps in understanding who truly has access and whether it’s appropriate.

Terminated employees also present a risk in manual processes. Ensuring that former employees’ access is promptly revoked from all systems can be overlooked, leaving open access points that should have been closed.

Another significant challenge is the risk posed by the reviewer themselves. The person conducting the reviews needs to have deep knowledge of the applications being reviewed, enough time to thoroughly complete the reviews, and a solid understanding of the reporting. Without these, the review process can be flawed, leading to missed issues or incorrect assessments of user access.

To avoid these risks, consider automating your User Access Reviews. Finosec’s User Access Review platform can handle and analyze vast amounts of data efficiently, ensuring comprehensive and accurate reviews. Here’s how it helps:

  • Efficient Analysis: Handles large data sets accurately.
  • Comprehensive Reviews: Provides a clear picture of access and identifies unauthorized access.
  • Tracks Keys and Codes: Manages both digital and physical access controls rigorously

Thinking back on those not-so-distant days with yardsticks and side-by-side reports, it’s clear that while the fundamentals of user access reviews have remained, the complexity and scale have dramatically increased. Adopting automated solutions like Finosec’s User Access Review platform is not just a modern necessity but a crucial step to ensure our institutions remain secure and compliant in an ever-evolving risk landscape.

If you’re looking to safeguard your operations and reputation, it might be time to reassess your current UAR processes and explore automation.

Streamline Security, Simplify Compliance

Automate your User Access Reviews with Finosec to enhance security, save time, and ensure compliance. Learn more about how our platform can streamline your processes and protect your institution.

Learn More About User Access Reviews through Finosec

More from Finosec

The Critical Link Between Third-Party Risk Management (TPRM) and Access Management

The Critical Link Between Third-Party Risk Management (TPRM) and Access Management

As highlighted in a recent article from the Federal Reserve, managing third-party relationships and the access associated with those relationships is a critical component of Third-Party Risk Management (TPRM). The associated access third party vendors have to banking systems is known as Access Management and is foundational for mitigating risks associated with third-party relationships. Access Management may be easy to overlook because it does not always reside with the same person or team as TPRM; making it difficult to provide critical oversight.

With increased regulatory focus, how should institutions be thinking of Access Management? Here are five steps your institution can take today to strengthen your third-party governance.

The Critical Foundation of Managing Access to Banking Systems

The Critical Foundation of Managing Access to Banking Systems

Managing access to banking systems has become increasingly complex as financial institutions navigate legacy reporting systems, API access, and cloud solutions. These challenges, along with the risks posed by unmanaged systems, emphasize the need for maintaining a...

Talk To An Expert Now
Talk To An Expert Now 770.268.2765