Back to Blog

User Access Review Best Practices: Step 2 – Start With The Most Important

By Finosec

January 12, 2023

Get notified on new insights from Finosec now!

Be the first to know about new Finosec blogs to grow your knowledge of the cybersecurity governance industry today!

User Access Best Practices Code TwoBlog (1)

We learned about the importance of a System Map in Step One: Building the Foundation, last week.
This week, we are discussing Step 2 – Start with the Most Important. In this critical step in the user access review process, you will identify the most important systems by identifying the high-risk activities each system performs.

Step Two: Start with the most important

Let’s face it, in life and work; we have too many things on our list and not enough time.   Being successful with cybersecurity governance requires starting with the most important. To accomplish this with user access reviews, you should always start this process with the highest-risk systems. These typically include systems such as active directory, core processing, wire transfer, and every system you have that has customer information or has the ability to perform financial transactions.

Once you have defined these high-risk systems, the user review process can be intimidating. It is not uncommon to have 15+ high-risk systems. It is also not uncommon to have the number of permission options in each system be 3,000+. This is why the user access reports for banking applications can be hundreds if not thousands of pages long.

To make this process manageable, start by focusing on privileged access and the permissions that have escalated capabilities. For example, in core processing, privileged access will include access to general ledger (GL) memo post, dormant accounts, online transaction entry, and more. In wire transaction platforms, approvals and wire limits are higher risks. And increasingly, remote access to systems has acquired a greater risk profile. As more and more employees can (and prefer to) do their functions remotely, the systems which enable this access and these activities become more attractive targets for cyberattacks.

You gain a real advantage when you start your review with higher-risk systems and permissions.

It gives you a logical place to begin, and it should prevent you from feeling as if you’ve been asked to boil the ocean.

Want more information?

This is just the second step on the journey toward simplified and improved user access reviews. Click to read about Step One: Building the Foundation Watch for three more related blogs, each one exploring another element of better UARs.

Or, if your frustration has already spiked because your institution still follows outdated processes to complete your user access reviews, you should contact FINOSEC today. We’d love to work alongside you to simplify your user access review process and make them easier than ever!

More from Finosec

Integrating FFIEC Authentication Guidance: A Blueprint for Your Next Exam With Insights from Recent Regulatory Actions

Integrating FFIEC Authentication Guidance: A Blueprint for Your Next Exam With Insights from Recent Regulatory Actions

The Federal Financial Institutions Examination Council (FFIEC) Authentication Guidance update in August 2021 has marked a significant step towards enhancing authentication and security access measures within financial institutions. This update expanded upon previous handbooks from 2005 and 2011, emphasizing a broader scope that now includes employees, third-party vendors, and system-to-system communications via APIs.

The Best Defense Against Ransomware

The Best Defense Against Ransomware

Beth Sumner, our VP of Customer Success, recently had the opportunity to discuss ransomware attacks and the importance of community bankers staying vigilant against these crimes in Independent Banker.  While the number of ransomware attacks continues to increase, so do the sums demanded by the attackers.

Succession Planning: Essential for Sustaining Information Security

Succession Planning: Essential for Sustaining Information Security

In today’s world where cyber threats evolve rapidly, the challenge of replacing an Information Security Officer (ISO) underscores a critical issue: the cybersecurity job market is scorching, yet talent is scarce. This gap has turned recruitment into a high-stakes game for financial institutions, where the departure of an ISO exposes vulnerabilities and regulatory risks. With remote work expanding the competition for skilled professionals, the importance of strategic succession planning has never been more acute, ensuring that institutions remain fortified even in the face of staffing changes.

Talk To An Expert Now
Talk To An Expert Now 770.268.2765